The security of many functions in computer systems is dependent on the ability to verify the integrity of statements made by third parties, second parties (the party with which one is interacting), or one¡¯s own statements. This is certainly the case for key management, where a trusted third party makes a statement about a particular key that is to be used. It also applies to attestation, accreditation, and digital signatures. In the questions that follow, I will describe a statement that is made in a system and you are to tell me who made that statement. More specifically, you are to tell me what key is used to protect the integrity of the statement and if there is a specific name for the key that is used, provide that name. You should also make it clear in your answer, who is in possession of the key needed to protect the integrity of the statement. For example, if I were to ask: The Kerberos ticket tells us what session key has been assigned for use between a particular client and server. You are to respond that the ticket is issued by the KDC and that the ticket is encrypted using the key shared between the KDC and the server (sometimes referred to as the server key or Ks). Now, let¡¯s begin:
INSTRUCTION:
The report must be submitted by 11:59 p.m. on Sunday Novmber 18th, 2018. To submit your report you will use the USC DEN D2L (https://courses.uscden.net/d2l/home/14159) submission mechanism. You will use this method regardless of whether you are an on-campus student or a DEN student. Please be sure to include your name and USC ID number in the body of the assignment (i.e. within the Word, PDF, or Text File).
INSTRUCTION:
The report must be submitted by 11:00 p.m. on November 24th, 2019. The report should be approximately 3 pages, or roughly 1200 to 1500 words. To submit your report you will use the USC DEN D2L (https://courses.uscden.net/d2l/home/16089) submission mechanism. You will use this method regardless of whether you are an on-campus student or a DEN student. Please be sure to include your name and USC ID number in the body of the assignment (i.e. within the Word, PDF, or Text File).
It is the individual student's responsibility to follow the submission instruction. Submissions that do not follow this instructions, e.g., submitted late, or only "Saved" and not submitted. may be penalized or may not be graded at all. Note that the submission box for the assignment may dissapear from the class web site at 11PM on November 26th, i.e. the submission deadline plus 48 hours.
For the three reading reports in this course (of which this is one), students may receive an automatic extension of 48 hours total that may be applied across the three homework assignments. If you turn in one of your assignments 8 hours late, then you will only have 40 hours remaining in extensions to use on subsequent assignments. I suggest not using the whole 48 hours on the first assignment, because if you have an unforseen scheduling issue arises later in the semester, it will be your problem. Late assignments (beyond any extension) will be assesed 1 full letter penalty per day they are late, and if the topic of an assignment is covered in the lecture following the due date, then the assignment will not be accepted beyond that lecture.
GUIDELINE:
This is a lot to cover in so few words - so our advice is to write a first pass at your answer that is longer, and then edit out material that is redundant or not to the point. The use of tables can be very effective in conveying your ideas in a small area, but the tables must be integrated with your textual discussion, and not the only item in your submission.