Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.
Answer should be a clear explanation and should be clear understanding (1000 words).
Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.
When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%
As reference you can use the following book:
Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)
Author: Anderson, R.
ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526
Publisher: John Wiley & Sons
Book available from below link:
http://www.cl.cam.ac.uk/~rja14/book.html
Chapter 2 (pp 17-60), chapter 4 (pp 93-104), chapter 6 (pp 192-211).
Skim sections 4.2.3-4.2.7, 4.3, 6.2, 6.4.2. Total - 73 pages
Assignment is:
1) An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother’s maiden name, a password, and the amount of your last purchase, but also your dog’s nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.) (500 words)
2) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (300 words)
3) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)