# In this assignment, there are 7 (seven) questions in total. Question 1 is on Message Authentication Code (MAC) Based on Hash Function. Hash functions are extremely useful and appear in almost all information security applications. Hash-based Message Authentication Code is a specific type of Message Authentication Code (MAC) involving a hash function and a secret key. It can be used to achieve message authentication and data

In this assignment, there are 7 (seven) questions in total. Question 1 is on Message Authentication Code (MAC) Based on Hash Function. Hash functions are extremely useful and appear in almost all information security applications. Hash-based Message Authentication Code is a specific type of Message Authentication Code (MAC) involving a hash function and a secret key. It can be used to achieve message authentication and data.

*In this assignment, there are 7 (seven) questions in total. Question 1 is on ***Message Authentication Code (MAC) Based on Hash Function.*** Hash functions are extremely useful and appear in almost all information security applications. Hash-based Message Authentication Code is a specific type of Message Authentication Code (MAC) involving a hash function and a secret key. It can be used to achieve message authentication and data integrity in information exchange over Internet. SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit digest. In question Q1, you are expected to apply your understanding of SHA-1 to generate MAC.*

*The second question Q2 is about Security Analysis on a Simple Hash Function. A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length. A secure hash function needs to be collision resistance, preimage resistance, and second preimage resistance. In question Q2, you are expected to perform security analysis on a simple hash function and improve its security.*

### Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now*The third question Q3 is about Security Analysis on RSA Digital Signature Scheme. The question has three parts. In the first part, you are expected to demonstrate your understanding of the RSA digital signature verification. In the second part, you are expected to perform a signature forgery attack to the RSA digital signature scheme. In the third part, you are expected to give your suggestion how to improve the security of the RSA digital signature scheme against the signature forgery attack.*

*Question 4 is about Public Key Certificate with Digital Signature Standard (DSS). The question has three parts. In the first part, you are expected to demonstrate your understanding of the key generation of DSS. In the second part, you are expected to demonstrate your understanding of the signing process of DSS for public key certificate. In the third part, you are expected to demonstrate your understanding of how to verify public key certificate based on DSS. For part 1 to 3 of Question 4, values of required parameters are provided and you should demonstrate the key generation, signing and verification processes with detail computations and brief explanations. Marks will be deducted if you fail to show the detail computation correctly, skip the computation steps, or do not provide explanations.*

*Question 5 is about Security Analysis on Diffie-Hellman Key Agreement Protocol. The question has three parts. In the first part, you are expected to demonstrate your understanding of the Diffie-Hellman key exchange protocol. In the second part, you are expected to perform a man-in-the-middle attack to the Diffie-Hellman key exchange protocol. In the last part, you are expected to propose an improved key exchange protocol which is able to overcome the man-in-the-middle attack. *

*Question 6 is about Key Agreement with Symmetric Key. The question has three parts. In the first part, you are expected to understand the protocol designer’s reasoning. In the second part, you are expected to perform an attack to the protocol. In the last part, you are expected to fix the security weakness by modifying the protocol. *

*Question 7 is on Use Authentication with Kerberos. The question has three parts. In the first part, *

*you are expected to demonstrate your understanding of how to send a request to the Authenticated Server for a ticket in Kerberos. In the second part, you are expected to demonstrate your understanding of how to forward the ticket together with your authentication code to the server. In the last part, you are expected to demonstrate your understanding of how to retrieve the session key to access the service server.*

*Your answer should contain both diagram and explanation. Marks will be deducted if you fail to provide diagram and explanation correctly, skip the diagram, or do not provide explanations.*