Suppose a web server does not provide HTTPS but HTTP only. It provides a function for users to change the users' passwords. Suppose an adversary is eavesdropping the communication between users and the web server. The web server can use javascript to protect all transmitted sensitive passwords.
Implement the coding BASED on the resource at http://www.uow.edu.au/~fuchun/2019/A1.html
The implementation must satisfy the following requirements.
username | username |
oldpassword | N|T|H(0|T|N|OP) |
newpassword | H(1|T|N|O|P) XOR NP|H(T|N|OP|NP) |
T: The current Unix time
H(): The MD5 hash function
N: Your student number
|: character concatenation
OP: old password
NP: new password
XOR: bit XOR operation
Describe which parts are the most difficult for you when you tried to do the programming and how you solved them.
Describe how the server verifies and updates passwords for users in Q1.
Describe the differences between hub, switch and router.
Describe and briefly explain what are changed in the VPN network. Here, "what" refers to IP address, MAC address and Port number.
Briefly explain what is man-in-the-middle attack.
Explain the reason why replaying attack is related to integrity security.
(Lecture 3, page 16) List another solution for Alice if she doesn't have a secure website to publish H(S).
Use algorithms to describe how Alice runs a hybrid encryption to send a digital movie to Bob.
Describe how to compute the group element
(ghxuy)1/z
Here, we have group elements g,h,u and integers x,y,z.