CS 231: Computer Security

Cryptographic scenarios

Folder: cryptography
File: cryptography/scenarios.txt or cryptography/scenarios.pdf

Please work with one or two partners for this assignment. See this survey to let me know whether you want me to assign you a partner.

What you have to work with

Suppose Alice, Bob, Eve, Mal, and all their friends and enemies have access to the following.

The Scenarios

For each of the following scenarios, describe as concisely as you can how you would use the tools listed above to achieve the goals described in the scenario. Then, briefly explain why your plan achieves those goals.

Make your plans as simple as possible given the goals of the scenario. You might be able to come up with a single plan that handles all the scenarios, but that's not what I'm after. I want you to understand the properties of Diffie Hellman, RSA, cryptographic hashes, digital signatures, etc. By responding to each scenario with the simplest plan using the available tools, you'll demonstrate that understanding.

We'll use Eve to refer to any eavesdropper, and Mal to refer to any person attempting a person-in-the-middle attack.

  1. Alice wants to send Bob a long message, and she doesn't want Eve to be able to read it. (I say "Eve" here because I want you to assume for this scenario that person-in-the-middle is impossible, and give an answer that is as simple as possible under that assumption.)
  2. Alice wants to send Bob a long message. She doesn't want Mal to be able to intercept, read, and modify the message without Bob detecting the change. Next time, change "intercept, read, and modify" to "modify". For this one, I don't care if Mal can read the message. I just want Bob to be able to detect modification. So to be absolutely clear, I should remove the word "read" from this description. And the word "intercept" is pretty much redundant with "modify", so let's remove it, too.
  3. Alice wants to send Bob a long message, she doesn't want Eve to be able to read it, and she wants Bob to have confidence that it was Alice who sent the message. (Again, don't worry about Mal and person-in-the-middle here.)
  4. Alice wants to send Bob a long message (in this case, it's a contract between AliceCom and BobCom). She doesn't want Eve to be able to read it. She wants Bob to have confidence that it was Alice who sent the message. She doesn't want Bob to be able to change the document and claim successfully in court that the changed version was the real version. And finally, Bob doesn't want Alice to be able to say in court that she never sent the contract in the first place. This one needs to be rewritten. It's good to introduce repudiation concerns here, but do we care about Mal? And if not, then how is this one different from #3?