SECENG module Seminar 5 Group Project 1. The topic of this week’s project is related to next week’s topic. Read the article ‘Personal Firewalls’ at http://www.firewallguide.com/software.htm. Choose...

1 answer below »

SECENG module Seminar 5 Group Project 1. The topic of this week’s project is related to next week’s topic. Read the article ‘Personal Firewalls’ at http://www.firewallguide.com/software.htm. Choose one of the firewalls discussed in the article or some other firewalls that you know already or Microsoft XP Service Package 2 if you use Windows XP, and install it on your computer. This project should be finished in this week. After you install the personal firewall we can test it using an invited attack by linking to the following site: http://grc.com/x/ne.dll?bh0bkyd2. Briefly report what you have done and what are your findings? Also briefly report what personal firewalls can do and what they cannot do to protect your personal computers. Present one potential benefit that you get from installing a personal firewall (in particular, something that you cannot do without it). In your report, you may also briefly discuss antivirus software, anti-spyware software and their relationship to personal firewalls. This week’s project is mostly finished by each student separately. But if you meet some problems or if you have some ideas, feel free to discuss with you colleagues in your project folder. 2. (Not required, if you have not done so, please install one to your computer since we are trying to be secure) Install an anti-virus software program on your computer and an anti spyware package (e.g., spybot) on your computer. You can choose one free package from http://www.freebyte.com/antivirus/, http://www.grisoft.com/html/us_index.html, or http://www.webattack.com/Freeware/security/fwvirus.shtml, or use some commercial one if you have them installed on your computer already. 3. (Optional also): This project is not mandatory and your work on this project will not be included in your grade. We will discuss network security in Week 6. As a preparation, you could download the Intrusion Detection Tools snort from http://www.snort.org/ and install it on your computer (there are both versions for UNIX and MS Windows). Right now, perhaps you do not want to write a rule set for intrusion detection, but it will helpful for you to run the snort in observation mode to check what is happening on your network card. Also try to install the penetration test tool nessus from http://www.nessus.org/. Note that in order for nessus to work, you need to install the server nessusd on some UNIX (e.g. Linux) machine. If you have no access to UNIX system, you could ignore this part. Discuss your findings in the project folder.

Answered Same DayDec 22, 2021

Answer To: SECENG module Seminar 5 Group Project 1. The topic of this week’s project is related to next week’s...

Robert answered on Dec 22 2021
125 Votes
Identity Based Encryption
Identity based encryption (IBE) is ID-based cryptography. It is public key encryption in which
public key is the user’s some unique information about the user’s identity like
email, id
number etc. It could be anything like name or domain of the user, even the IP-address can
be the key which it translates to.
The Identity based encryption was proposed by Adi Shamir in 1984. He only gave the
instantiation based signatures. ID based encryption has remained problem for many years.
One of the most popular examples of ID based encryption was researches leading up to
provide in Maurer.
In ID based systems any party communicating can create a general public key from any
known identity like ASCII string. The PKG (Private Key Generator) which is highly trusted
system generate the corresponding private keys. It operates in this procedure:
1. PKG publishes the master key and retains the corresponding key.
2. Any party on the network can compute the public key based upon the combination
of the master key and the ID (identity) value.
3. To have the authorized use the party contacts the PKG which uses its Master key to
generate the private key identity for the identity ID.
These parties may encrypt the message with no prior distribution of the keys between the
individual parties. Hence it is very useful in the case where pre-distribution of the
authenticated keys is difficult or infeasible due to the various technical problems and
restraints.
To decrypt the sign messages the authorized user must obtain the appropriate private key
from PKG. The caution is to decrypt the message without the need of the authorization; PKG
must be such strong and trust worthy. As any user’s private key can be created complete
any 3rd party’s secret, this might be as inherent key escrow. These systems have been
proposed which remove all the escrow which includes certificate based encryption,
certificate-less and secured key issuing cryptography.
One of the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here