Design an algorithm to achieve the byzantine agreement

1) An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother’s maiden name, a password, and the amount of your last purchase, but also your dog’s nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.) (500 words)

2) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (300 words)

3) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

Order from us and get better grades. We are the service you have been looking for.