, Page 1 of 15 School of Science COSC2536/2537 Security in Computing and Information Technology Assignment 2 Assessment Type: Individual assignment; no group work. Submit online via Canvas→Assignments→Assignment 2. Marks awarded for meeting requirements as closely as possible. Clarifications/updates may be made via announcements/relevant discussion forums. Due date: Week 10, Friday the 14th May 2021 11:59pm Deadlines will not be advanced, but they may be extended. Please check Canvas→Syllabus or via Canvas→Assignments→Assignment 2 for the most up to date information. As this is a major assignment in which you demonstrate your understanding, a university standard late penalty of 10% per each working day applies for up to 5 working days late, unless special consideration has been granted. Weighting: 50 marks (Contributes 50% of the total Grade) 1. Overview The objective of Assignment 2 is to evaluate your knowledge on the topics covered mainly in Lecture 5 to 10. Topics include Privacy-preserving computations based on RSA, ElGamal, and Paillier Cryptosystems; Digital Signature, Blockchain and Cryptocurrency, Digital Authentication & Security Protocols, and Digital Authorization and Intrusion Detection. However, topics covered in Lecture 1 to 10 are required as a prerequisite. Assignment-2 will focus on developing your abilities in the application of knowledge, critical analysis, and decision making. Assignment 2 contains several problems related to the topics mentioned above. You are required to prepare your answers and upload them as a single PDF or Word document in CANVAS. Only one question requires code submission in the CANVAS if attempted, and the corresponding code should be uploaded as a ZIP file on the CANVAS. If you answer Q4(b), submit PDF and ZIP files separately. In this assignment, there are 5 (five) questions in total. Question 1 is about designing Privacy-Preserving Secure System. In this question, you are expected to apply your understanding of privacy-preserving computation in the context of electronic voting (E-Voting) based on the homomorphic property of Paillier Cryptosystems. Question 2 is about the application of Digital Signature Schemes. In this question, you are expected to demonstrate your understanding of the RSA and ElGamal digital signature schemes. You are required to show step-by-step processes for both of the digital signature schemes addressing the sub-questions. Marks will be deducted if you fail to show the detailed computation correctly, skip the computation steps, or do not provide explanations. Question 3 is about showing your understanding on RSA-based public key cryptography. In this question, you are required to analyze the given scenario based on the RSA-based public key cryptography and show detailed steps to compromise it with numerical example. You are allowed to choose your own value. However, values should be , Page 2 of 15 correct. Marks will be deducted if you fail to show the detail computation correctly, skip the computation steps, or do not provide explanations with numerical values. Question 4 is on report writing on Blockchain or implementation of a blockchain-based system. Only for this question, you can submit the solution individually or in a group. In the case of a group submission, the maximum number of group members can be 3 (three), and you can form the group with students of different classes. In the solution PDF at the beginning of this question’s answer, you must mention the names of group members with their class Names (in “DAY- TIME” format, e.g., MON-14:30 – 15:30). In this question, there are 2 (two) options: Q4(a) and Q4(b). You need to choose any 1 out of the two options. The first option Q4(a) is on report writing, and option Q4(b) is about the implementation of a blockchain-based system. If you select Q4(a), you are expected to demonstrate your understanding of the Blockchain and Privacy Preservation and write a well-organized report on a given topic. We are looking for interesting and innovative system descriptions in the report. You are expected to address the items mentioned in the problem statement (at least). However, to secure good marks, you have to think out of the box. The report should be appended in the same document where you write the answers to other questions. Further instructions are given in the question. If you select Q4(b), you are expected to implement a blockchain system for a given scenario. You should describe detailed steps of implementation with necessary code segments. Additionally, you need to submit the code on the CANVAS as a separate ZIP file on the CANVAS. Please DO NOT include your solution PDF within the ZIP File. Question 5 is related to analyzing and designing the security of authentication protocols. Your answer should contain the necessary explanation and diagrams as stated in the problem statement. Marks will be deducted if you fail to provide the explanation correctly and/or diagrams for all of the protocols. Develop this assignment in an iterative fashion (as opposed to completing it in one sitting). You should be able to start preparing your answers immediately after Lecture-5 (in Week-5). At the end of each week, starting from Week-5 to Week-10, you should be able to solve at least one question. If there are questions, you must ask via the relevant Canvas discussion forums in a general manner. Also, attend consultation sessions when announced. Overall, you must follow the special instructions below: • You must fulfil the requirements in the questions. • Upload your solution as a single PDF or Word document in CANVAS. Also, upload codes as a separate single ZIP file in the CANVAS. • Do not put the PDF within the ZIP file. • For the questions that require implementation, you must implement the functionalities stated in the questions. Any change in a user interface is acceptable if the functionality is there. In your report, you must show all of the steps with necessary code segments and screenshots for each question. 2. Assessment Criteria This assessment will determine your ability to: • Follow requirements provided in this document and in the lessons. • Independently solve a problem by using cryptography and cryptanalysis concepts taught over the last six weeks from fifth to tenth weeks of the course. • Meeting deadlines. , Page 3 of 15 3. Learning Outcomes This assessment is relevant to the following Learning Outcomes: 1. CLO 1: explain the functioning of security services in computing environments and the security issues in networked applications. 2. CLO 2: discuss various types of data integrity and confidentiality mechanisms including public key cryptography. 3. CLO 3: describe basic system security mechanisms and protocols, such as those used in operating systems, file systems and computer networks. 4. CLO 4: analyse the overarching importance of IT security in areas such as networking, databases, operating systems, and web systems. 5. CLO 5: apply privacy principles in basic practical settings in IT environments. 6. CLO 6: analyse and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing. 4. Assessment details Please ensure that you have read Section 1 to 3 of this document before going further. Assessment details (i.e. question Q1 to Q5) are provided in the next page. , Page 4 of 15 Q1. Privacy Preserving Secure Models (Marks: 6) Privacy Preserving Online Voting System Recently, several controversies have been observed in voting around the world. Even electronic voting can be manipulated1. In an electronic voting system, the voting authority cannot be trusted completely as it can be biased. Using a privacy-preserving online voting system removes controversy in the voting system. In this privacy-preserving online voting system, voters encrypt their votes in the voting booth before sending them to the voting authority. A voting server records each encrypted vote and determines the voting result on behalf of the voting booth as the voting booth does not have enough computation power. The encrypted result is sent to the voting authority, which determines the winner based on encrypted votes. The homomorphic property of the Paillier Cryptosystem allows the addition of encrypted numbers. Therefore, the Paillier Cryptosystem can be used in developing a privacy-preserving online voting application. In this task, you need to design a privacy preserving online voting system as shown in Figure-1 using the Paillier cryptosystem. Suppose that a group of students want to elect their club president. Your designed privacy-preserving voting application must fulfil the following requirements: • Votes must be encrypted from Voting Booth using Paillier Cryptosystem before sending them to the Voting Server. • A vote is an integer number which should be equivalent to a 12-bit binary string. • The number of candidates should be three. For example, ALICE, BOB, and EVE. • The number of voters can be maximum 16. • Assume that four voters will vote for ALICE, two voters will vote for BOB, and two voters will vote for EVE. after counting the votes, the Voting Authority (VA) should find four votes for Alice, two votes for BOB, and two votes for EVE. • The Voting Authority chooses p=157, q=127 and select g=8821. • The private numbers chosen by 8 voters and their votes are as follows: Voter No. Voter’s Private Number, r Vote for Voting message, m 1 91 ALICE 000000000001 = 1 2 92 ALICE 000000000001 = 1 3 93 ALICE 000000000001 = 1 4 94 ALICE 000000000001 = 1 5 95 BOB 000000010000 = 16 6 96 BOB 000000010000 = 16 7 97 EVE 000100000000 = 256 8 98 EVE 000100000000 = 256 • The Voting Authority sets up required public and private keys and makes the public-keys to all voting booth before the vote starts. , Page 5 of 15 Figure-1: Privacy-preserving voting system Show detail step-by-step computations of the key generation, encryption, homomorphic computations, and decryption processes for votes of 8 voters. [Note: Refer to the Week 5 lecture and Workshop-5.] [1. https://www.dw.com/en/democracy-in-danger-elections-are-easy-to-manipulate/a-45858161] [If you are interested to implement a broader version of this system as the Capstone/Honours project, please contact the Lecturer] Q2. Application of Digital Signature (Marks: 7) The working procedure of the digital signature is illustrated in Figure-2. It is recommended that you use the concept of digital signature to answer both Q2(a) and Q2(b). Figure-2: Overview of the Digital Signature ALICE BOB EVE Candidates , Page 6 of 15 (a) Digital signature for large text message (Marks: 3) Suppose Bob (the sender) wants to send a large text message M to Alice (the receiver). The text message M is as follows (in bold and italic face): Blockchain gained notoriety and quickly became part of popular parlance during 2017’s unprecedented cryptocurrency boom. The technology builds on longstanding concepts and techniques in distributed transaction processing and encryption. Software developers initially brought these ideas together in a remarkably innovative manner to support Bitcoin’s 2009 launch, giving rise to the first “blockchain” network. Cryptocurrencies, many of which use the concepts Bitcoin introduced, continue to proliferate Before sending the message, Bob generates a hash h(M) of the text message M using the MD5 hash algorithm and converts h(M) into integer message m. Then, he signs the m and sends it to Alice. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification, Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses the following parameters: 1st Prime number: p = 430620674058481288123238045697123658933 2nd Prime number: q = 124566090654136987961913344431645866767 Public key parameter: e=23 In this task, you need to show how Bob generates digital signature for a large text message and Alice verifies the signature using RSA based digital signature scheme. To do this: i. Show how Bob would generate Public and Private keys. ii. Show how Bob would generate the digital signature for M. iii. Show how Alice would verify the digital signature using Bob’s public-key. iv. Do you think that RSA based digital signature can be forged? Justify why or why not. [Note: Refer to the Week 6 Lecture and Workshop-6 and the “Running Example of RSA Signature for Text Message” of Week-6 lecture notes. Use the following links: For generating MD5 hash: http://www.miraclesalad.com/webtools/md5.php For converting hexadecimal to decimal and vice versa: https://www.mobilefish.com/services/big_number/big_number.php For performing large integer operations (power mod, inverse mod, LCM, GCD, Multiplication): https://www.mobilefish.com/services/big_number_equation/big_number_equation.php ] (b) ElGamal based digital signature scheme (Marks: 4) Recently, Charlie has developed a software for Alice’s Restaurant. Alice emails the payable amount (M) to her manager Bob. To ensure the integrity and authenticity, Alice generates a digital signature for the above amount with ElGamal based digital signature scheme and sends the signed message to Bob via email. Alice chooses ElGamal public key (i.e., modulus p and generator g) and private-key (i.e., secret number x). Bob chooses a random number k. The equivalent decimal numbers as follows: In this task, you need to show how Alice generates digital signature and Bob verifies the payable amount using ElGamal based digital signature scheme. To do this: i. Show how Alice would generate Public and Private keys. ii. Show how Alice would generate the digital signature for M. M = 2300, p = 191447, g = 425, x = 1998, k = 2813 , Page 7 of 15 iii. Show how Bob would verify the digital signature using Alice’s public-key. iv. Does ElGamal Signature approach prevent cheating on digital signature? Justify why or why not. [Note: Refer to the Week 6 Lecture and Workshop-6.] Use the following links: For performing large integer operations (power mod, inverse mod, LCM, GCD, Multiplication): https://www.mobilefish.com/services/big_number_equation/big_number_equation.php ] Q3. Compromising Public Key Cryptography (Marks: 7) Assume that Jenny and Kelly are secretly communicating using an RSA-based public-key cryptosystem. Alex is an intelligent guy who is intercepting the communications between Jenny and Kelly. Say, Alex has intercepted a ciphertext C that Kelly created by encrypting a message M using Jenny’s public key and was being sent to Jenny. As Alex does not know Jenny’s private key, he plans to do a trick to find out M. Alex challenges Jenny that he can decrypt the message M if Jenny agrees to encrypt another message (any message except C) using her private key. You are expected to explain if it is possible for Alex to find M using the trick? Explain with a numerical example for each step. Q4. Secure systems - Report Writing or Implementation (Marks: 20) You need to answer any 1 of the following question in a group of maximum 3 (three) people. However, it is absolutely fine if you want to do it individually. (a) Report Writing on Designing a Secure System Buying real estate involves many complex tasks from both buyer and seller points of view. The main tasks of the buyer involve searching for a suitable property, arranging finance, and verifying the property information. A seller has to ensure proper permits (e.g., land titling, building permit, approve building design, etc.) from the designated authority to sell real estate. The financial organization (e.g., bank) plays an important role by ensuring the buyer's financial solvency. A bank collects several personal documents of a buyer and verifies them before providing finance to a buyer. Overall, digital real estate purchasing and selling management involves the collection of sensitive (i.e., personal) data of both buyer and seller. Also, purchasing and selling requires approval at different levels which creates avenues for the breach of privacy of collecting sensitive data and fraudulence (by providing fake documents or tampering information) from both buyer and seller point of view. Write a report on how the blockchain technology can be used to prevent document or information tampering and the privacy of sensitive data of both buyers and sellers can be preserved in digital real estate purchasing and selling management systems. The report should be well structured having a proper introduction, main body, and concluding remarks. You must provide necessary diagrams based on your own thoughts as well as collected from different sources. The report must contain the followings (but not limited to): i. An overview of the traditional digital real estate purchasing and selling management systems with one or more scenarios of possible privacy breach and data tampering. ii. Necessary diagrams for illustration whenever required. , Page 8 of 15 iii. Briefly explain your understanding of privacy-preserving digital real estate purchasing and selling management systems with necessary diagrams with a brief summary of different privacy- preserving techniques that can be used in this scenario. iv. Briefly explain your understanding on the Blockchain technology and its usefulness in different applications. i. Explain with necessary diagrams how a privacy-preserving digital real estate purchasing and selling management systems can be integrated with blockchain technology. ii. Explain how the integrity and traceability of data can be achieved using blockchain in your specified system. iii. Explain the challenges of using privacy-preserving techniques and blockchain technology in digital real estate purchasing and selling management systems. You must provide necessary references (at least 15) using APA referencing style including both research and online articles. Articles can be searched in: • Google, • Google Scholar (https://scholar.google.com/), • IEEEXplore (https://ieeexplore.ieee.org/Xplore/home.jsp), etc. Texts should be presented in IEEE Double-Column format with maximum 6 pages. For your convenience, a MS Word template for the report is provided in the Assignment-2 Home Page on CANVAS. [Note: Refer to the Week 7 lecture and Workshop-7.] (b) Implementation of a Blockchain-based digital real estate purchasing and selling management system [Note: You should attempt this task if you have prior programming skills. Otherwise, answer Q4(a).] Implement a blockchain-based digital real estate purchasing and selling management systems that will ensure integrity and traceability of data. The implemented blockchain-based digital real estate purchasing and selling management systems should fulfil the following requirements: • The system should have four types of users: seller, authority, buyer, and bank. • A seller can a create a permit application with the following information: property address, owner/vendor details, building design (in this case just upload a PDF file with name “design.pdf”), and seller licence number (e.g., L1001). Upon the submission of the permit application, information mentioned above should be stored in the blockchain and the seller will receive a permit application ID. • An authority can either approves or disapproves a permit application. The decision should be stored in the blockchain along with the property address which can be verified later. • A buyer can send a loan application to a bank with his/her personal details (e.g., full name, date of birth (DOB), current address, contact number, employer name, annual income, address of the property intended to purchase, and loan amount). Upon the submission of the loan application, information mentioned above should be stored in the blockchain and the buyer will receive a loan application ID. • A bank either approves or disapproves a loan application by verifying the status of the permit of the property. The decision should be stored in the blockchain along with the buyer’s full name, current address, contact number, and date of birth which can be verified later by a seller. , Page 9 of 15 • The seller can verify the loan application status of a buyer before the deal. If the status of the loan application of a buyer is “approved”, the seller makes the deal. Otherwise, the deal is cancelled. The buyer can see the deal status. You are allowed to use any programming language or scripting language such as Java, PHP, Python, JavaScript, etc. A good graphical user interface (GUI) is expected. However, you can also provide user friendly command- line user interface. Upon completion of the implementation, you are expected to: I. Create a report containing the implementation details and user instructions. II. Upload your code and report in the CANVAS. [Note: Refer to the Week 8 Lecture and Workshop 8.] [If you are interested to implement a broader version of this system as the Capstone/Honours project, please contact the Lecturer] Q5. Designing a Secure Authentication Protocol for a One-to-One Secure Messaging Platform (Marks: 10) (a) Analysing the security strength of authentication protocols (Marks: 7.5) Assume that you have been hired to design a secure mutual authentication and key establishment protocol for a new messaging software. In the software, two users (ex: Alice and Bob) needs to exchange messages using a public-key cryptography based authentication protocol to achieve mutual authentication and establish a secure session key (K) before the start of the conversation as shown in Figure-3. According to the given scenario, Alice and Bob should exchange three messages to achieve mutual authentication and establish the secure session key (K). Assume that Alice is the initiator of the communication. Alice sends “Message 1” to Bob and Bob replies with “Message 2”. Figure-3: Overview of the secure mutual authentication and key establishment protocol You have options to choose from several protocols and analyzing their security strength. The prospective security protocols are as follows: , Page 10 of 15 i. In protocol-1, Message 1: {“Alice”, K, RA}Bob, Message 2: RA,RB ii. In protocol-2, Message 1: “Alice”, {K, RA}Bob, Message 2: RA, {RB}Alice iii. In protocol-3, Message 1: “Alice”, {K}Bob, [RA]Alice, Message 2: RA, [RB]Bob iv. In protocol-4, Message 1: RA, {“Alice”, K}Bob, [RA]Alice, Message 2: [RA]Bob, {RB}Alice v. In protocol-5, Message 1: {“Alice”, K, RA, RB}Bob, Message 2: RA, {RB}Alice In this task, you need to critically analyze the above protocols and clearly explain which protocol or protocols would be secured and why. Notations are summarized below: K : Session key RA : Nonce generated by Alice RB : Nonce generated by Bob {“Message”}Alice : Encryption Function that encrypts “Message” using Alice’s public Key [“Message”]Alice : Encryption Function that encrypts “Message” using Alice’s private Key which is also known as signed “Message” by Alice [Note: Refer to the Week 9 lecture and Workshop 9.] (b) Designing a secure authentication protocol (Marks: 2.5) Assume that Alice and Bob want you to design a secure two-message authentication protocol (requires only two messages to achieve mutual authentication as shown in Figure-4) for their chat application that will provide mutual authentication and establish a session key (K) for each communication. While designing the authentication protocol, you should remember that public-keys of both sender (e.g., Alice) and receiver (e.g., Bob) are known to everyone in the network. Therefore, it important to ensure anonymity of the communicating users in the authentication protocol. For your information, if an authentication protocol provides anonymity then an attacker cannot identify the person who is communicating. In other words, a message in the authentication protocol providing anonymity does not reveal user’s identity. Figure-4: Overview of the two-message secure mutual authentication and key establishment protocol In this task, you need to explain the followings with diagrams: i. Show a two-message authentication protocol that will achieve mutual authentication for two communicating users (say, Alice and Bob). ii. Assume Trudy is a passive attacker who can only watch messages between Alice and Bob. Trudy cannot perform any replay or Man-in-the-Middle (MiM) attack. Now, analyse critically if your protocol ensure , Page 11 of 15 anonymity or not from Trudy. If your protocol does not provide anonymity, what changes are required to your protocol to ensure anonymity? [Note: Refer to the Week 9 lecture and Workshop 9.] , Page 12 of 15 5. Academic integrity and plagiarism (standard warning) Academic integrity is about honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas. You should take extreme care that you have: • Acknowledged words, data, diagrams, models, frameworks and/or ideas of others you have quoted (i.e. directly copied), summarized, paraphrased, discussed or mentioned in your assessment through the appropriate referencing methods, • Provided a reference list of the publication details so your reader can locate the source if necessary. This includes material taken from Internet sites. If you do not acknowledge the sources of your material, you may be accused of plagiarism because you have passed off the work and ideas of another person without appropriate referencing, as if they were your own. RMIT University treats plagiarism as a very serious offence constituting misconduct. Plagiarism covers a variety of inappropriate behaviors, including: • Failure to properly document a source • Copyright material from the internet or databases • Collusion between students For further information on our policies and procedures, please refer to the University website. 6. Assessment declaration When you submit work electronically, you agree to the assessment declaration. , Page 13 of 15 7. Rubric/assessment criteria for marking All of the computations must be correct and only provided values must be used. Instructions must be followed. Criteria The characteristic or outcome that is being judged. Total Question 1 Privacy Preserving Secure Models Step-by-step processes are shown with detail computations. All of the computations shown are correct. Step-by-step processes are shown with detail computations. Most of the computations are correct with few errors. Step-by-step processes are shown with detail computations. Most of the computations are incorrect with few correct computations. Step-by-step processes are not shown with detail computations. All of the calculations are wrong. Not answered. 6 Marks 6 Marks 4 Marks 2 Marks 1 Marks 0 Marks Question 2(a) Digital signature for large text message Step-by-step processes are shown with required explanation. All of the computations are shown correctly in detail. Security strength of RSA Signature is well justified. Step-by-step processes are shown with required explanation. Not all of the computations are shown correctly in detail. Security strength of RSA Signature is NOT well justified. Steps that are shown partially correct and explanations are not up to the mark. Or, Steps are not shown correctly. Security strength of RSA Signature is INCORRECTLY justified or justification is NOT provided. Steps that are shown are not correct. Or, The answer is incomplete. Not answered. 3 Marks 3 Marks 2 Marks 1 Marks 0.5 Marks 0 Marks Question 2(b) ElGamal based digital signature scheme Step-by-step processes are shown with required explanation. All of the computations are shown correctly in detail. Security strength of ElGamal Signature is well justified. Step-by-step processes are shown with required explanation. Not all of the computations are shown correctly in detail. Security strength of ElGamal Signature is NOT well justified. Steps that are shown partially correct and explanations are not up to the mark. Or, Steps are not shown correctly. Security strength of ElGamal Signature is INCORRECTLY justified, or justification is NOT provided. Steps that are shown are not correct. Or, The answer is incomplete. Not answered. 4 Marks 4 Marks 3 Marks 2 Marks 1 Marks 0 Marks , Page 14 of 15 Question 3 Compromising Public Key Cryptography Steps of compromising Public Key Cryptography for the given scenario is up to the mark. Numerical example is shown for each step. Steps of compromising Public Key Cryptography for the given scenario is up to the mark. Numerical example is NOT shown or INCORRECTLY shown for each step. Steps of compromising Public Key Cryptography for the given scenario is NOT up to the mark. Numerical example is NOT shown or INCORRECTLY shown for each step. Not answered 7 Marks 7 Marks 3 Marks 1 Marks 0 Marks Question 4 Report Writing OR Implementation (a) Report Writing on Application of Blockchain Technology The report is prepared fulfilling all of the requirements with innovative ideas. Presentation is excellent. The report is prepared fulfilling all of the requirements. However, no innovative idea is presented. Presentation is good. The report is prepared fulfilling all of the requirements. However, the content is not enough to express the main theme of the given topic. Presentation is not up to the mark. The report is NOT prepared fulfilling all of the requirements. The key topics are not well connected. Presentation is poor. The report addresses only few of the requirements. The key topics are missing or not connected. Presentation is poor. Not answered 20 Marks 20 Marks 16 Marks 10 Marks 8 Marks 4 Marks 0 Marks (b) Implementation of a Blockchain- based Real Estate Management System Implementation is described with proper screenshots. Code is provided in the CANVAS. Implementation is described with proper screenshots. Code is provided in the CANVAS. Implementation is described with proper screenshots. However, functionalities or user interface could have been better. Description is not provided with proper screenshots. Code is provided in the CANVAS. The implementation does not fulfil all the requirements. Description is not provided with proper screenshots. Code is provided in the CANVAS. Only a few requirements are fulfilled. Descriptions and implementation is not adequate. Code is NOT provided in the CANVAS. Not answered 20 Marks 16 Marks 10 Marks 8 Marks 4 Marks 0 Marks Question 5(a) Analyzing the Security Strength of Authentication Protocols Analysis on all of the scenarios in the given authentication protocols is presented correctly with diagrams. Analysis on 4 scenarios in the given authentication protocols is presented correctly with diagrams Analysis on 3 scenarios in the given authentication protocols is presented correctly with diagrams Analysis on 2 scenarios in the given authentication protocols is presented correctly with diagrams Analysis on 1 scenario in the given authentication protocols is presented correctly with diagrams Not answered 7.5 Marks , Page 15 of 15 7.5 Marks 6 Marks 4.5 Marks 3 Marks 1.5 Marks 0 Marks Question 5(b) Designing a Secure Authentication Protocol Answer is up to the mark. Both questions are answered satisfactorily. Diagrams are shown. Only one question is answered satisfactorily. Diagrams are shown. Only one question is answered satisfactorily. Only one diagram is shown. Not answered OR Answer is incorrect 2.5 Marks 2.5 Marks 1.5 Marks 1 Mark 0 Marks
欢迎咨询51作业君