New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
COIT20262
AU
Central Queensland University
Attempt all questions. This is an individual assignment, and it is expected students answer the questions themselves. Discussion of approaches to solving questions is allowed (and encouraged), however each student should develop and write-up their own answers. See CQUniversity resources on Referencing and Plagiarism. Guidelines for this assignment include:
• Do not exchange files (reports, captures, diagrams) with other students.
• Complete tasks with virtnet yourself – do not use results from another student.
• Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks) or from other students.
• Write your own explanations. In some cases, students may arrive at the same numerical answer, however their explanation of the answer should always be their own.
• Do not copy text from websites or textbooks. During research you should read and understand what others have written, and then write in your own words.
• Perform the tasks using the correct values listed in the question and using the correct file names.
Packet Capture and Analysis
For this question you must use virtnet (as used in the tutorials) to perform an interception attack. This assumes you have already setup and are familiar with virtnet. See Moodle and tutorial instructions for information on setting up and using virtnet. The tasks and sub-questions are grouped into multiple phases. You must complete all phases, in order.
In this question the Unit Coordinator created your public/private key pair. For the following sub-questions, assume you create your own key pair on your own computer.
Consider the following scheme. You create your own key pair on your computer, extract the public key .pem file, and then encrypt that file with AES and a secret key known by the entire class (including the Unit Coordinator). You then send the encrypted public key to the Unit Coordinator.
(e) Explain how a masquerade attack could be performed on the above scheme, including how/why that attack would be successful.
(f) Design a scheme for which a masquerade attack would not be successful.
(g) Explain why your above designed scheme defeats the masquerade attack
15,000+ happy customers and counting!