Procedure to exchange the message confidentially

Assignment Help Basic Computer Science
Reference no: EM132693731

1. Alice and Bob have each generated a public and private key pair. However, they do not know each other's' keys yet. Now they are trying to exchange a message M over a network.

(a) What is the procedure to exchange the message confidentially, if only passive attacks need to be considered?

(b) What can be done to mitigate the risk if active attacks are possible?

2. Ahmed and arisha are having a discussion about Public Key Infrastructure (PKI). Ahmed asked that it is simply a way of authenticating users. However, Arisha argues that it is a type of encryption algorithm. They have said you to decide, who is correct, for each opinion, you should provide one reason for why it is either correct or incorrect?

3. Does a digital signature ensure the entire message is encrypted? You should provide the reason to support your statement

4. As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $ 2 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10%

5. Every time typing complex and long password to logon into application server by Alice while using SSH protocol. To use asymmetric cryptography for "password-less" authentication suggested by Bob. Alice implemented Bob suggestion to using asymmetric cryptography for password-less authentication ,what are the steps Alice should perform? Apart from listing the steps, please provide us with a suitable asymmetric key that you have generated.

6. Bob enter a "passphrase" when he created the authentication key. how is the passphrase used by MD5, While Alice may not want to passphrase and what benefits does it provide?

7. How does an attack differ from threat to information security? How can the two overlap?

8. How can university protect itself from a Man-in-the-Middle attack?

Reference no: EM132693731

Questions Cloud

Describe the goods and services industry produces : Select an industry and describe the goods and/or services this industry produces. Identify this industry's market structure and at least two or more market.
Discuss the relationship between law-ethics and morality : Discuss the relationship between law, ethics, and morality? Has this relationship changed in the era of Big Data and the Internet of Things
What is personal jurisdiction : What is personal jurisdiction? How is it complied/applied in resolving the jurisdiction issue in Internet cases?
Aspects of implementing a crm strategy : 1. Explain what is meant by the integration and automation aspects of implementing a CRM strategy
Procedure to exchange the message confidentially : (a) What is the procedure to exchange the message confidentially, if only passive attacks need to be considered?
Field of education are currently held accountable : Discuss how people in your field of education are currently held accountable. How would you like to see educators in this field evaluated?
Why is the knowledge of excel skills crucial : Why is the knowledge of Excel skills crucial for success in the workplace or businesses within your field of study?
Define whats going to happen in the future : COVID-19 has shifted everyones opinions on whats going to happen in the future. Included here is the view from another perspective, the patient.
Describe service oriented architecture : 1. Define and describe service oriented architecture 2. Compare and contrast the roles of web servicesweb pages.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Collecting evidence in a cloud environment

Describe some of the challenges a forensic investigator faces with collecting evidence in a cloud environment

  Effective comptuer forensics incident response for project

Identify appropriate roles and responsibilities needed for effective forensics incident response for the project organization.

  Face an evolving landscape of environmental

Entities, including businesses, governments and non-profits, face an evolving landscape of environmental, social and governance (ESG)-related risks

  Virtual private networks

One of the ways businesses provide secure access to their network (or a subset of their network) to remote (or mobile) users is to use virtual private networks

  What are three examples of programming languages

What are three examples of programming languages? What makes each of these languages useful to programmers?

  Interfaces to remote objects in general and corba

1. Explain why the interfaces to remote objects in general and CORBA objects in particular do not provide constructors.

  Object-oriented design versus traditional approach

Object-Oriented Design versus Traditional Approach. Compare the object-oriented approach to design to the traditional approach.

  Library card catalog using sql

Imagine that you must access a library card catalog using SQL. Write a SQL query that you would use to search for any books by J.J. Parsons

  Why is it so important to know your data

Why is it so important to know your data? Discuss some methods you would implement to better learn and understand your data.

  Execution of the routine broccoli

Given a stack s which contains the following elements: (2, 4, 6, 8, 10, 12 14) where 2 is at the bottom of the stack and 14 is at the top.

  Databases are important in businesses

Databases are important in businesses and organizations because they provide a highly efficient method for handling data.

  Formula to use and the values for each

How much money do you have to invest to accumulate a total $4761 in 327 days if you are able to earn 9% on your money?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd