Design an algorithm to achieve the byzantine agreement for


1) An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.) (500 words)

2) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (300 words)

3) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Design an algorithm to achieve the byzantine agreement for
Reference No:- TGS0665446

Now Priced at $40 (50% Discount)

Recommended (94%)

Rated (4.6/5)