CSE 2500 Computer Security and Privacy Tutorial Sheet 07 Q1) A McDonalds look like company which is conceived by a Monash MBA has developed with the help of 5 chefs a number of recipes which he thinks will take the market by storm. However, he received recently an anonymous tip stating that that three of the five chefs are considering job offers from their competitor (of course it has to be McDonalds, however, the tip off does not say who they are). Assuming that only those 5 chefs can use the company’s computer, which has the recipes in files and unfortunately, the Monash MBA hasn’t done any subjects from Information Technology Faculty, he does not know how to use the computer (or its related programs). However, he wants the chefs to store the recipes so that no subset of three can steal the complete recipes. Describe a method of storing the information so that the above objective can be met. Q2) Consider the following protocol for accessing data from a remote database server. 1. Users obtain the database server’s public key from the system arbitrator. 2. Users generate their own public/private key pairs and send the public portion to the arbitrator. 3. Users encode their identity and the query using their own personal private key to generate the message and are sent to the database server. 4. Database server requests the user’s public key from the system arbitrator. 5. Database server decodes the user’s message using the user’s public key, and checks a local access list to see whether the user is allowed to access the data requested in the query. 6. If the user is allowed to have the requested information, the database server executes the query and then encodes the results of the query using the databases server’s private key, then encrypts the result with the requesting user’s public key. However if the user is not allowed to access the requested information, the database generates the message permission denied and encrypts this message as described above. 7. When the encrypted result of the query is received by user, it is first decoded using the user’s private key and then the public key of the database server. Comment on the following statements: Is it allowed to have double encryption as in step 6? If yes, how you will decrypt the double encrypted message? Why we need double encryption in step 6? Why cannot we use single encryption using one of the following key (public key of the user, public key of the database, private key of the user or the private key of the database)? Will the protocol be better if we change the order of encryption in step 6? 1 of 2 2 of 2