INTE2401代做、代写C/C++,Python程序
School of Computing Technologies
INTE2401/2402/2691 Cloud Security
Assignment 2
Assessment Type: Individual assignment; no group work. Submit online via Canvas→Assignments→Assignment 2.
Marks awarded for meeting requirements as closely as possible. Clarifications/updates may be made via announcements/relevant discussion forums.
Due date: Week 8, Sunday the 4th May 2025 11:59pm
As this is a major assignment in which you demonstrate your understanding, a university standard late penalty of 10% per each working day applies for up to 5 working days late, unless special consideration has been granted.
Weighting: 35 marks (Contributes 35% of the total Grade)

1.Overview
The objective of Assignment 2 is evaluating your knowledge on the topics covered mainly in Lecture 2 to 8. Topics include SHA-3, HMAC, Kerberos, and Security Protocols for Cloud Computing. However, topics covered in Lecture 1 are required as prerequisite. Assignment 2 will focus on developing your abilities in application of knowledge, critical analysis and decision making. Assignment 2 contains several problems related to the topics mentioned above. You are required to prepare your answers and upload them as a zipped (compressed) file in CANVAS.
In this assignment, there are 5 (five) questions related to AWS.
Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. Amazon S3 uses checksum values to verify the integrity of data that you upload or download. You can choose a hash function as the checksum algorithm to use when uploading, copying, or batch copying your data. SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. The first question of this assignment is about SHA-3. You are expected to hash your personal information in one round of SHA-3. Through this question, you are expected to understand the hash process of SHA-3 in details.
Question 2 is on Signing AWS Requests with Signature Version 4. When you send HTTP requests to AWS, you need to sign the requests so that AWS can identify who sent them. You sign requests with your AWS access key, which consists of an access key ID and secret access key. The signing process helps secure requests in the following ways: verify the identity of the requester, protect data in transit, and protect against potential replay attacks. In this question, you are required to use AWS Signature Version 4 to generate a signature on a given string. Through this question, you are expected to understand the detail signature generation and verification process of AWS Signature Version 4.
Question 3 is about Kerberos authentication in AWS. In AWS, you can use Kerberos authentication to authenticate users when they connect to your MySQL DB instance. The DB instance works with AWS Directory Service for Microsoft Active Directory (AWS Managed Microsoft AD) to enable Kerberos authentication. When users authenticate with a MySQL DB instance, authentication requests are forwarded. Forwarded requests go to the domain directory that you create with AWS Directory Service. Keeping all of your credentials in the same directory can save you time and effort. With this approach, you have a centralized place for storing and managing credentials for multiple DB instances. Using a directory can also improve your overall security profile. In this question, you are required to implement Simplified Kerberos for AWS. Through the question, you are expected to understand how Kerberos authentication is used to authenticate a user when he connects to your MySQL DB instance in AWS.
Question 4 is about AWS Site-to-Site VPN based on Diffie-Hellman key establishment. An AWS Site-to-Site VPN connection connects your Virtual Private Cloud (VPC) to your data centre. Amazon supports Internet Protocol Security (IPSec) VPN connections. Data transferred between your VPC and data centre routes over an encrypted VPN connection to help maintain the confidentiality and integrity of data in transit. Internet Key Exchange (IKEv2) is the protocol used to set up a security association (SA) in the IPSec protocol suite. IKEv2 uses a Diffie–Hellman key exchange to set up a shared session secret from which cryptographic keys are derived. The question has three parts. In the first part, you are expected to implement the Diffie-Hellman key exchange protocol for AWS Site-to-Site VPN. In the second part, you are expected to perform a man-in-the-middle attack to the Diffie-Hellman key exchange protocol. In the last part, you are expected to propose an improved key exchange protocol which is able to overcome the man-in-the-middle attack.
The last question is on Secure Socket Layer (SSL) Handshake Protocol. Secure Sockets Layer (SSL) is a standard security technology for establishing an encrypted link between a server and a client - typically a web server (website) and a web browser. AWS Certificate Manager from Amazon Web Services (AWS) takes care of deploying certificates to help you enable SSL/TLS for your website. Assume that AWS Certificate Manager issues you a SSL certificate and you have installed the certificate in your website hosted on AWS. When a client browses your website, suppose the client will run a SSL handshake protocol with ephemeral public key with your website to establish an encrypted link between the client and your website. In this question, we are expected to demonstrate your understanding how SSL handshake protocol with ephemeral public key work and analyse client authentication, server authentication, and forward security of the SSL handshake protocol.
Develop this assignment in an iterative fashion (as opposed to completing it in one sitting). You should be able to start preparing your answers immediately after Lecture-5 (in Week-5). At the end of each week starting from Week-5 to Week-8, you should be able to solve at least one question.
If there are questions, you may ask via the relevant Canvas discussion forums in a general manner.



2.Learning Outcomes
This assessment is relevant to the following Learning Outcomes:
understand how AWS applies hashing techniques, digital signature, key management, and security protocols to achieve cloud security.
discuss various types of confidentiality, authentication and data integrity mechanisms in cloud computing.
analyze the strength and limitations of security protocols for cloud computing.
design and implement security mechanisms and protocols.
3.Submission
You must follow the following special instructions:
You must use the values provided in the questions.
Hand-written answers are not allowed and will not be assessed. Compose your answers using any word processing software (e.g. MS Word).
You are required to show all of the steps and intermediate results for each question.
Upload your solutions as a single PDF or Word document together with programming codes in CANVAS.

This assessment will determine your ability to:
Follow requirements provided in this document and in the lessons.
Independently solve a problem by using security concepts taught over the first four weeks of the course.
Meeting deadlines.

After the due date, you will have 5 business days to submit your assignment as a late submission. Late submissions will incur a penalty of 10% per day. After these five days, Canvas will be closed and you will lose ALL the assignment marks.
4.Assessment details
Please ensure that you have read Section 1 to 3 of this document before going further. Assessment details (i.e. question Q1 to Q5) are provided in the next page.


Q1. Cloud Data Checksum with SHA-3 (Marks: 1+1+1+1+1=5)
Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. Amazon S3 uses checksum values to verify the integrity of data that you upload or download. You can choose a hash function as the checksum algorithm to use when uploading, copying, or batch copying your data. SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. SHA-3 is based on a novel approach called sponge construction. Sponge construction is based on a wide random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility. In this question, you are expected to hash your personal information in the first round of SHA-3 as shown in Figure 1.




Assume that you are using SHA-3 to calculate the checksum of the first 200 bits of the ASCII codes of your personal information, including your real name, student ID, email address, your program, your courses …. (Note that the format does not matter as long as we can identify you).

(1)What is the output of mapping in the first round?
(2)What is the output of mapping in the first round?
(3)What is the output of mapping in the first round?
(4)What is the output of mapping in the first round?
(5)What is the output of mapping in the first round?

Note: Please provide your answers in 5x5 matrixes with entries in Hex.
Q2. Signing AWS Requests with Signature Version 4 (Marks: 1+1+1+1+1=5)
When you send HTTP requests to AWS, you need to sign the requests so that AWS can identify who sent them. You sign requests with your AWS access key, which consists of an access key ID and secret access key. The signing process helps secure requests in the following ways: verify the identity of the requester, protect data in transit, and protect against potential replay attacks. Creating a signed request includes 3 steps: (1) create a string to sign for Signature Version 4; (2) calculate the signature for AWS Signature Version 4; (3) add the signature to the HTTP request. AWS Signature Version 4 is built on HMAC-SHA256 as shown in Figure 2.



Suppose that a string to sign is as follows:
AWS4-HMAC-SHA256
20250415M123600Z
20250415/us-east-1/iam/aws4_request
f536975d06c0309214f805bb90ccff089219ecd68b2577efef23edd43b7e1a59

Assume that kSecret = your student ID/K7MDENG+bPxRfiCYEXAMPLEKEY.
(1)Compute kDate = HMAC("AWS4" + kSecret, Date), where Date = 20250415;
(2)Compute kRegion = HMAC(kDate, Region), where Region = us-east-1;
(3)Compute kService = HMAC(kRegion, Service), where Service = iam;
(4)Compute kSigning = HMAC(kService, "aws4_request");
(5)Compute the signature = HexEncode(HMAC(kSigning, string to sign))

Note: Please use SHA256 https://emn178.github.io/online-tools/sha256.html in HMAC-SHA256.
Please your real student ID.
Please refer to https://docs.aws.amazon.com/general/latest/gr/sigv4-calculate-signature.html

Q3. AWS Kerberos Authentication (Marks: 2+2+2+2+2=10)
In AWS, you can use Kerberos authentication to authenticate users when they connect to your MySQL DB instance. The DB instance works with AWS Directory Service for Microsoft Active Directory (AWS Managed Microsoft AD) to enable Kerberos authentication. When users authenticate with a MySQL DB instance, authentication requests are forwarded. Forwarded requests go to the domain directory that you create with AWS Directory Service. Keeping all of your credentials in the same directory can save you time and effort. With this approach, you have a centralized place for storing and managing credentials for multiple DB instances. Using a directory can also improve your overall security profile. In this question, you are required to implement Simplified Kerberos for AWS as shown in Figure 3.


(1)Implement AES-128 encryption and decryption algorithms in CBC mode.
(2)Assume C=your first name, S=your surname, KC=MD5(C, your student ID), KS=MD5(S, your student ID), Lt=8 hours, nC=MD5(C),
(i)implement each step of Phase 1 of Simplified Kerberos using AES-128 in (1)
(ii)implement each step of Phase 2 of Simplified Kerberos using AES-128 in (1)
(3)What is the ticket (Hex numbers) in your implementation? What is the authenticator (Hex numbers) in your implementation?
(4)Please explain how the user can be authenticated by the server and how the server can be authenticated by the user in the protocol.
Note: Please use MD5 https://emn178.github.io/online-tools/md5.html
Please submit your codes for (1) and (2).
Please use the current time as the timestamp ts in your implementation.
You can randomly choose any 128-bit KC,S and any 128-bit session key sk in your implementation.

Q4. AWS Site-to-Site VPN based on Diffie-Hellman Key Establishment (Marks: 2+2+2+2+2=10)
An AWS Site-to-Site VPN connection connects your Virtual Private Cloud (VPC) to your data centre as shown in Figure 4. Amazon supports Internet Protocol Security (IPSec) VPN connections. Data transferred between your VPC and data centre routes over an encrypted VPN connection maintain the confidentiality and integrity of data in transit. Internet Key Exchange (IKEv2) is the protocol used to set up a security association (SA) in the IPSec protocol suite. IKEv2 uses X.509 certificates for authentication ‒ either pre-shared or distributed and a Diffie–Hellman key exchange to set up a shared session secret from which cryptographic keys are derived.



The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. In this question, you are required to implement the Diffie–Hellman key exchange protocol (Group 2) between your VPC and your data centre.
For the Diffie-Hellman key exchange protocol, assume
--
p=178011905478542266528237562450159990145232156369120674273274450314442865788737020770612695252123463079567156784778466449970650770920727857050009668388144034129745221171818506047231150039301079959358067395348717066319802262019714966524135060945913707594956514672855690606794135837542707371727429551343320695239
g=174068207532402095185811980123523436538604490794561350978495831040599953488455823147851597408940950725307797094915759492368300574252438761037084473467180148876118103083043754985190983472601550494691329488083395492313850000361646482644608492304078721818959999056496097769368017749273708962006689187956744210730
--

(1)Implemenent 160-bit random number geneator and secure hash algorithm SHA1;
(2)Use a Crypto Library to implement the modular exploentiation algorithm for larger integers and use your implementation to output y=gx(mod p), where x=SHA1(your student ID).
(3)After randomly genetating 160-bit a and 160-bit b, output (A, gA(mod p)) and (B, gB(mod p)) and the secret key gAB (mod p) established between your VPC (named by your first name) and your data centre (named by your surname) by the Diffie-Hellman key exchange protocol, where A=SHA1(a, your first name) and B=SHA1(b, your surname).
(4)Can you perform a Man-in-the-Middle Attack to the Diffie-Hellman key exchange protocol? If so, show attacking steps.
(5)How does IKEv2 overcome the Man-in-the-Middle Attack? Show steps.

Note: Please submit your codes, computation results, security analysis and secure protocol.


Q5. SSL Handshake Protocol (Marks: 1+1+1+1+1=5)
AWS Certificate Manager from Amazon Web Services (AWS) takes care of deploying certificates to help you enable SSL/TLS for your website. Assume that AWS Certificate Manager issues you a SSL certificate and you have installed the certificate in your website hosted on AWS. When a client browses your website, suppose the client will run a SSL handshake protocol with ephemeral public key with your website to establish an encrypted link between the client and your website as shown in Figure 5.





In the certificate of your website, if 2048-bit RSA public keys are
n=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
e=(10001)16
If your private signing key is
d=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

(1)Choose your ephemeral public key with 1024 bits and set e as the largest prime factor of your student number.
(2)What is the ServerKeyExchange message (Hex numbers) in Figure 5?
(3)If Pre_Master_Secret is SHA384(your real email address), where the hash function is SHA384 (https://emn178.github.io/online-tools/sha384.html), what is the ClientKeyExchange message (Hex number) in Figure 5?
(4)Analyse client authentication and server authentication of the handshake protocol.
(5)Analyse the forward security of the handshake protocol.


Hint: Compute modular exponentiations and inverse with online tool at https://www.boxentriq.com/code-breaking/modular-exponentiation.
https://www.boxentriq.com/code-breaking/modular-multiplicative-inverse



5.Academic integrity and plagiarism (standard warning)
Academic integrity is about honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas. You should take extreme care that you have:
Acknowledged words, data, diagrams, models, frameworks and/or ideas of others you have quoted (i.e. directly copied), summarized, paraphrased, discussed or mentioned in your assessment through the appropriate referencing methods,
Provided a reference list of the publication details so your reader can locate the source if necessary. This includes material taken from Internet sites.
If you do not acknowledge the sources of your material, you may be accused of plagiarism because you have passed off the work and ideas of another person without appropriate referencing, as if they were your own.
RMIT University treats plagiarism as a very serious offence constituting misconduct. Plagiarism covers a variety of inappropriate behaviors, including:
Failure to properly document a source
Copyright material from the internet or databases
Collusion between students
For further information on our policies and procedures, please refer to the University website.

6.Assessment declaration
When you submit work electronically, you agree to the assessment declaration.




7.Rubric/assessment criteria for marking
All of the computations must be correct and only provided values must be used. Instructions must be followed.
Criteria
The characteristic or outcome that is being judged. Total

Question 1
Cloud Data Checksum with SHA-3 Questions (1)-(5) are answered correctly.


Step-by-step processes are shown with detail computations.

All of the computations are shown correctly in detail. Any 4 of questions (1)-(5) are answered correctly.



Step-by-step processes are shown with detail computations.

The computations in the 4 questions are shown correctly in detail. Any 3 of questions (1)-(5) are answered correctly.



Step-by-step processes are shown with detail computations.

The computations in the 3 questions are shown correctly in detail. Any 2 of questions (1)-(5) are answered correctly.



Step-by-step processes are shown with detail computations.

The computations in the 2 questions are shown correctly in detail.



Any one of questions (1)-(5) is answered correctly.



Step-by-step processes are shown with detail computations.

The computations in the 1 question are shown correctly in detail.

Answer is not correct

Or

Not answered





5 Marks
5 Marks 4 Marks 3 Marks 2 Mark 1 Mark 0 Marks

Question 2
Signing AWS Requests with Signature Version Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

All of the computations are shown correctly in detail.


Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations in the 4 questions are shown correctly in detail.

Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations in the 3 questions are shown correctly in detail.

Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations in the 2 questions are shown correctly in detail.




Any one of questions (1)-(5) is answered correctly.

Step-by-step processes are shown with detail computations.

The computations in the 1 question is shown correctly in detail.

Answer is not correct

Or

Not answered





5 Marks
5 Marks 4 Marks 3 Marks 2 Mark 1 Mark 0 Marks

Question 3
AWS Kerberos Authentication Questions (1)-(4) are answered correctly.

All of the implementations and security analysis are done correctly in detail.

Any 4 of questions (1), (2) (i), 2(ii), (3), (4) are answered correctly.


The implementations and security analysis in the 4 questions are done correctly in detail.

Any 3 of questions (1), (2) (i), 2(ii), (3), (4) are answered correctly.


The implementations and security analysis in the 3 questions are done correctly in detail.

Any 2 of questions (1), (2) (i), 2(ii), (3), (4) are answered correctly.


The implementations and security analysis in the 2 questions are done correctly in detail.

Any 1 of questions (1), (2) (i), 2(ii), (3), (4) are answered correctly.


The implementations and security analysis in the 1 question are done correctly in detail.

Answer is not correct

Or

Not answered

10 Marks
10 Marks 8 Marks 6 Marks 4 Mark 2 Mark 0 Marks

Question 4
AWS Site-to-Site VPN based on Diffie-Hellman Key Establishment Questions (1)-(5) are answered correctly.


All of the implementations and security analysis are done correctly in detail.
Any 4 of questions (1)-(5) are answered correctly.



The implementations and security analysis in the 4 questions are done correctly in detail.

Any 3 of questions (1)-(5) are answered correctly.



The implementations and security analysis in the 3 questions are done correctly in detail.

Any 2 of questions (1)-(5) are answered correctly.

The implementations and security analysis in the 2 questions are done correctly in detail. Any one of questions (1)-(5) is answered correctly.



The implementations and security analysis in the 1 question is done correctly in detail. Answer is not correct

Or

Not answered


10 Marks
10 Marks 8 Marks 6 Marks 4 Mark 2 Mark 0 Marks

Question 5
SSL Handshake Protocol Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

All of the computations and security analysis are shown correctly in detail. Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations and security analysis in the 4 questions are shown correctly in detail. Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations and security analysis in the 3 questions are shown correctly in detail. Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations.

The computations and security analysis in the 2 questions are shown correctly in detail.
Any one of questions (1)-(5) is answered correctly.

Step-by-step processes are shown with detail computations.

The computations and security analysis in the question are shown correctly in detail. Answer is not correct

Or

Not answered

5 Marks
5 Marks 4 Marks 3 Marks 2 Mark 1 Mark 0 Marks

热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图