Give advice about use of cryptography to the developer

Assignment Help Computer Networking
Reference no: EM1350891

1. You have been hired to provide advice about the use of cryptography to the developer of new two products within a company.

a. Group A is developing a product which will encrypt each user's data before storing it on the hard disk, and decrypt it as it is accessed. Confidentially should be preserved. They want to know what encryption algorithms to use, and how it should be used to achieve their goals. What advice would you give this group?

b. Group B is developing a product which will allow users to send encrypted messages to other users around the world. Users typically do not know each other directly, but they should be able to send messages for which integrity and confidentiality are preserved. They want to know what encryption algorithm(s) to use, and how it (they) should be used to achieve the goals. What advice would you give this group?

Reference no: EM1350891

Questions Cloud

How social context affect mathematical development for child : Evaluate how social context can affect mathematical development for children.
Improve the employees performance : Improve an employee before terminating - Before discharging an employee, what are the proper steps in attempting to improve the employee's performance?
Finance related multiple choice questions : The primary users of external financial reports are;  If a company has $15,000 in assets and $10,000 in equities, then liabilities are
Find the magnitude of the charge on the moving particle : how is the graph of the total volume of a bathtub while the water inflow rate follows a seesaw pattern for half of the time and the similar pattern for outflows on the other half.
Give advice about use of cryptography to the developer : You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,
Improve the employees performance : Explain what are the proper steps in attempting to improve the employee's performance
Explain shutdown caused by the three branch of government : Explain Shutdown caused by the three branch of government that can't come to an agreement on the budget issue has continues it is likely to affect every sector of the US economy
Understanding the psychological development : understand psychological development? Explain your new understanding and how this has changed from reading and thinking about these issues.
Hps model and enabler analysis : Describe how HPS model interacts with a process diagram to aid in performing an Enabler Analysis, identify the process and explain each of the elements.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining users a cell can support blocking rate

Find out how many users a cell can support for a 5% call---blocking rate. Assume that each user produces 35mE of load in the busy hour.

  Socio-technical perspective useful in organizations

How taking a socio-technical perspective can be more productive in helping organizations manage information overload than either technical solutions or organizational solutions alone?

  Explaining bus collision avoidance protocol

Some network designers used alternative bus collision avoidance protocol known as the token bus protocol.

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

  Difference between tcp and udp

List the primary differences between the TCP and UDP. Would you recommend UDP or TCP for the voice over IP phone call? Justify your choice.

  Explaining labels in dns domain names

From RFC 1034, DNS domain names are composed of labels. Are there any labels which nodes are not allowed to allot to their data? If so, what are they?

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Compute total time required to transfer file

Compute the total time required to transfer a 1000KB file on a 1Mbps link with an RTD of 100msec ans a packet size of 1 KB in the following cases.a).

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Technical means to guarantee data confidentiality

Assess illustrate why technical means to guarantee data confidentiality depend upon trust.

  Audio-video conference by using ip multicasting

Let N users participating in audio/video conference by using IP multicasting. How many distinct SSRCs are required?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd