c) You are in charge of designing a secure Internet Banking System. While designing the system, you need to consider several aspects of information security, such as: i) user authentication, ii) bank...


c) You are in charge of designing a secure Internet Banking System. While designing the<br>system, you need to consider several aspects of information security, such as:<br>i) user authentication, ii) bank server authentication, iii) distribution of the public key (if<br>using an asymmetric cipher), iv) distribution of the symmetric key (if using a symmetric<br>cipher), v) confidentiality of the communication between the user and the bank server, vi)<br>integrity of the communication between the user and the bank server, vii) non-repudiation.<br>To address these design goals, you may need to use a combination of different types of<br>cryptographic/security primitives.<br>Symmetric<br>Asymmetric<br>Message<br>authentication<br>Digital<br>encryption signatures exchange<br>Hash<br>Public key<br>Key<br>Digital<br>Certificate<br>Ciphers<br>functions<br>cades (MAC)<br>Stream<br>Block<br>ciphers<br>ciphers<br>Figure 3: Basic cryptographic building blocks<br>Select appropriate primitives that you propose to address each of the above security<br>goals and provide necessary details supporting your selection. Your selection may<br>include, but is not limited to, primitives/infrastructure from Figure 3. You do not<br>necessarily need to specify an algorithm, but the kind of cryptographic primitives that you<br>will use for your construction.<br>Note: You need to provide a reasonable explanation for each selection.<br>

Extracted text: c) You are in charge of designing a secure Internet Banking System. While designing the system, you need to consider several aspects of information security, such as: i) user authentication, ii) bank server authentication, iii) distribution of the public key (if using an asymmetric cipher), iv) distribution of the symmetric key (if using a symmetric cipher), v) confidentiality of the communication between the user and the bank server, vi) integrity of the communication between the user and the bank server, vii) non-repudiation. To address these design goals, you may need to use a combination of different types of cryptographic/security primitives. Symmetric Asymmetric Message authentication Digital encryption signatures exchange Hash Public key Key Digital Certificate Ciphers functions cades (MAC) Stream Block ciphers ciphers Figure 3: Basic cryptographic building blocks Select appropriate primitives that you propose to address each of the above security goals and provide necessary details supporting your selection. Your selection may include, but is not limited to, primitives/infrastructure from Figure 3. You do not necessarily need to specify an algorithm, but the kind of cryptographic primitives that you will use for your construction. Note: You need to provide a reasonable explanation for each selection.

Jun 09, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here