Questions about on ssl

Assignment Help Operating System
Reference no: EM1379506

(i) (a) Provide a table showing the Caesar cipher with a key five, and then provide the result of applying this cipher to the text 'I came I saw I conquered'. (You can ignore the difference between upper- and lower-case letters.)
(b) A three-letter word has been encrypted using a Caesar cipher. Someone wants to decrypt the word, and decides to simply list all three-letter combinations from which the cipher text might have been produced. (We assume that the key is unknown to this person.) How many three-letter combinations will there be in the list? Explain your answer.
(c) Which is easier to break, the cipher used by an Enigma machine or a Caesar cipher?
(ii) Digital signatures employ a message digest. Assume that you have to choose between two (admittedly rather simplistic) methods for calculating the message digest. The first method checks whether or not the message starts with an 'a', and if this is true it returns True, otherwise it returns False. The second method determines the number of 'a's in the message. So, for example, the message digest of 'Study Calendar' is False according to the first method and ture according to the second method. Which method is most secure? Explain your answer, demonstrating that you understand the notion of a message digest and its role in digital signatures.

(iii)
(a) Describe in what respect asymmetric key cryptography is superior to symmetric key cryptography.
(b) What is the main drawback of asymmetric key cryptography techniques?
(c) For each of the following statements, state whether it is True, False or Indeterminate (i.e. there isn't sufficient information to tell whether it is True or False).
1- SSL uses symmetric cryptography to send a key securely over the internet.
2- SSL is very secure and efficient.
3- SSL sometimes uses the same symmetric key more than once.
4- SSL is efficient because it uses asymmetric key cryptography.
5- SSL requires the computers between which data is transferred to know each other's private keys. (iv)
(a) Which of the following passwords would you recommend, if you had to choose one? Explain your choice.
1- ^&*74446757$
2- Secret
3- A1anTur!ng
(b) Does choosing a secure password mean that you are safe once and for all?
hide problem

 

Reference no: EM1379506

Questions Cloud

Determine values of it industry certifications : Discuss briefly how IT certification works. What business arenas are IT certifications needed, security, or what technical problem is IT certification designed to solve?
Benefits and drawbacks of networked computers : Discuss the benefits of networked computers? What are the drawbacks? Describe similar characteristics between the internet and a group of networked computers.
Database statistics : In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.
Local area networks : Assume you are the network manager for Central University, a average size university with 13,000 students. The university has ten separate colleges
Questions about on ssl : Provide a table showing the Caesar cipher with a key five, and then provide the result of applying this cipher to the text 'I came I saw I conquered'.
Internal application server for application systems : Classic Catalog Corporation runs a small but rapidly increasing catalog sales business. It outsourced its Web operations to a local ISP for many years but as Web have become a larger portion of its business,
Question about lan operating systems : Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.
Programming language machine independence : Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.
Question about information security : Discover an article about information security. Give an introduction, and select various aspects of the article or Web site.

Reviews

Write a Review

Operating System Questions & Answers

  Characterize page fault rate-process first start execution

When a process first start execution, how would you characterize the page fault rate? Once the working set for a process is loaded into memory, how would you characterize the page fault rate?

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Validating the option code field during data entry

The systems reviewer are constructing the test plans for the user interface for the Holloway Travel Vehicles system.

  Implementation of the electronic medical record

Explain how the effectiveness the implementation of the electronic medical record change will be determined once implemented.

  Intermediate level tasks

Intermediate Level Tasks :  Below is a simple program. It creates 2 threads. The first thread keeps printing out X on the screen, and the second thread keeps printing out O on the screen.

  Discussion on dns for internet operations

Discuss how do you think the DNS is important for internet operations and what would happen if the DNS of your company/orgnization or your provider or root DNS fails?

  Computing effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of the remaining, 10 percent (or 2 percent of the total) cause page faults.What is the effective memory access time?

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  Handling the situation as a system administrator team leader

While working with the System Administration group, they tell you that a huge part of the administrator's duties focus on troubleshooting troubles within the network.

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Advantages of using smart cards for identification

Describe the advantages of using smart cards for identification and provide at least three examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd