How rsa asymmetric and aes symmetric encryptions work

Assignment Help Computer Network Security
Reference no: EM131507032

Assignment: Networks and Data Communications

The primary objective of this assignment is to ensure that students learn the concepts of networking and data communications. This includes topology concepts and related technologies that are inter-woven together in an intricate manner. The manner and methods of data transmission, internetworking concepts as well as protocols used in data communications.

TASK LIST

The assignment consists of three tasks, which require students to carry out research, write a report on their findings as well as analyse the techniques used in data communication.

Task 2 - IPv4

The network layer protocol in the TCP/IP protocol suite is currently IPv4 (Internet Protocol, version 4).

IPv4 provides the host-to-host communication between systems in the Internet. Although IPv4 is well designed, data communication has evolved since the inception of IPv4 in the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-growing Internet.

To overcome these deficiencies, IPv6 (Internet Protocol, version 6), also known as IPng (Internetworking Protocol, next generation) was proposed and is now a standard.

Write a report on IPv4. Your report should include:

- An introduction to IPv4

- Description of IPv4 with a diagram of the IPv4 architecture.

- Disadvantages and issues of IPv4 that led to the development of IPv6.

Your report should consist of a minimum of 750 words.

If the word count exceeds 10% of the stated word limit, 10% of the total marks of the paper will be deducted from the total marks obtained.

Task 3 - Data encryption Techniques

Data encryption is one of the main techniques used in network security. Data encryption can be classified into 2 types Asymmetric Encryption and Symmetric Encryption. With the aid of diagrams, show how RSA Asymmetric and AES Symmetric encryptions work.

Your report should include:

- Introduction to Network Security

- Characteristics of RSA and AES encryption.

- Diagram of RSA Asymmetric encryption.

- Diagram of AES Symmetric encryption.

Your report should consist of a minimum of 750 words.

Reference no: EM131507032

Questions Cloud

To which of these factors is the decision most sensitive : Anationwide motel chain is considering locating a new motel in Bigtown, USA. The cost of building a 150-room motel (excluding furnishings) is $5 million.
Evaluate the relative success of the bill of rights : Evaluate the relative success of the Bill of Rights in achieving an effective balance between national and states interests.
Describe the main purpose of reserving ip addresses : Create an IP address scheme that will accommodate 400 devices divided into 5 segments.
Which machine should the city purchase : A large city in the mid-West needs to acquire a street-cleaning machine to keep its roads looking nice year round. A used cleaning vehicle will cost $85,000.
How rsa asymmetric and aes symmetric encryptions work : Data encryption is one of the main techniques used in network security. With the aid of diagrams, show how RSA Asymmetric and AES Symmetric encryptions work.
Appropriate hardware and operating system : Name your business Decide what your email address will be Choose the most appropriate hardware and operating system
Find the breakeven percent reduction in labor hours : Refer to Problem. The best estimate for the reduction of labor hours for the new system is 17% (compared with the used system).
Explain ethical solutions toensure that the society benefits : Identify potential ethical and social issues related to IT administration ethics and Discuss ethical and social issues pertaining to ITsystems
Find sensitivity of annual profit changes in occupancny rate : A group of private investors borrowed $30 million to build 300 new luxury apartments near a large university. The money was borrowed at 6% annual interest.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd