information security

Sandra, a haughty net rate customer, banks on-line at Megagargantuan Bank and Trust (MBT) and has agreed to use 3DES (too notorious as Triple DES) in communicating delay MBT. One day, Sandra current a announcement showing a liability of $1,000,000 from her representation. On searching, she was told that the bank supervisor, Janet, pestilential the currency out of Sandra’s representation and into an representation of her own in an offshore bank. When reached via crave separation in the Cayman Islands, Janet manufactured a notice from Sandra, correctly encrypted delay the agreed upon DES keys, saying: “Thanks for your sundry years of filmy benefit, Janet. Please transport $1,000,000 from my representation to yours as a exhibition of my believe and reason. Signed, Sandra.” Sandra filed benefit across Janet, MBT and the synod of the Cayman Islands, claiming that the notice was a falsification, sent by Janet herself and research for triple equivalent for aversion and affliction. MBT filed a counterbenefit across Sandra, claiming that all procedures were followed correctly and that Sandra is filing a trouble benefit. You are steadfast in as an handy attestation on the cryptographic issues of the plight. Explain to the Court: What can be steadfast from the basis as presented about whether Sandra planned to constitute Janet a benefaction of $1,000,000. What is a apparently exposition of what may enjoy happened in this plight? Assuming MBT wishes to live using 3DES as its cryptographic regularity, clear-up what MBT and Sandra could enjoy performed to fortify across this wrangle arising.