Estimate the number of decimal digits of the keys

Assignment Help Computer Network Security
Reference no: EM131026957

Assignment 1: Cryptography

Question 1: Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be.

In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Your report should be maximum 2 pages and should contain relevant tables, calculations, a ranked list of threats (in terms of impact) and conclusions.

See the scoring sheet for this assignment, and ensure that your report fulfils the criteria listed.

Question 2: You are required to learn the GPG/PGP package (learning the applications of private and public key cryptography to secure email messages and documents) to be able to answer the following questions. You should pair up with one of your class fellow to do this lab and record results and give commentary on the results.

a) Generate keys of 3 different sizes for RSA encryption scheme and include these keys in the report.

b) Check the key files and estimate the number of decimal digits of the keys and write your estimates.

c) Encrypt a file (text or binary) using 3 key sizes and include your results and note the observation

d) Explain why GPG encryption and decryption are quite fast.

e) Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10MBs of data.

f) Export your public key and discuss the reason why your exported key should be in ASCII format.

g) Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

h) You should work with your class fellow to do this experiment and record your observation in the form of commands being used or procedure being followed and includeyour results.

I. Exchange your public key and your friend's public key using email.

II. Import your friend's public key into your key ring.

III. Encrypt a file using your friend's public key and send the encrypted file to your friend.

IV. Ask your friend to decrypt the encrypted file.

V. You can ask your friend to do the same thing.

i) Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents.

Reference no: EM131026957

Questions Cloud

How sustainable is sustainable tourism : How sustainable is sustainable tourism - Are capitalism and conservation compatible and examination of the implications of radically reducing oil dependency.
How would you prove the converse : Let S be the set of integers. If a, b ε S, define aRb if a + b is even. Prove that R is an equivalence relation and determine the equivalence classes of S.
What is the average velocity if the diameter changes to six : What is the average velocity if the diameter changes to 6 in.? b. Express the average velocity in terms of an arbitrary diameter.
What are the dimensions of the photo : A rectangular parking lot is 100 ft longer than it is wide. Determine the dimensions of the parking lot if it measures 500 ft diagonally.
Estimate the number of decimal digits of the keys : Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents - Encrypt a file and output the cipher text in ASCII format.
Prepare a contribution format income statement : Prepare an income statement for the month using absorption costing.
Analysis of systems translational and rotational velocities : Design a dampener such that the amplitude reduces to 10% of the initial after 2 oscillation with the same initial frequency -
How much did he budget for all bills : Jeff Bagwell of the Houston Astros has 104 hits in305 times at bat. Matt Williams of a Arizona team has 88 hits in 275 times at bat. Do they have the same batting average
Generate tax shields from depreciation : The company is assumed to earn sufficient revenues to generate tax shields from depreciation. Should Pilot Plus Pens replace the old machine now or at the end of five years?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create a cyber-security policy describing the principle

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Network security and wan connectivity

The project is to design a network, network security and WAN connectivity for the following situation:

  Differences between terms security class and security level

Explain the differences between the terms security class, security level, security clearance, and security classification and What are two rules that a reference monitor enforces?

  Explain in detail the security controls

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..

  Identify a successful three-way handshake?

Identify a successful three-way handshake?

  Difference between enterprise and it architecture

What is the difference between enterprise architecture and IT architecture and should enterprise architecture really be called "IT" architecture?"

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Compare and contrast the features of each product

Analyze and recommend two antivirus solutions that can be used on all 3 operating systems. Compare and contrast the features of each product, and make a recommendation about which should be used by MWS

  What is information security policy?

What is information security policy? Why it is critical to the success of the information security program

  Develop a security plan and recommendation memo to the cio

Develop a Security Plan and Recommendation Memo to the CIO

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd