What is relationship between hashing and digital signatures

Assignment Help JAVA Programming
Reference no: EM13316127

Task 1.Online Discussions

Below are listed a set of topics. You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

  • Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
  • Raise questions about the information provided by other students (this must be done in an adequately professional manner)
  • Respond to questions raised about your own information and other student's
  • Contribute to discussions in general

Note that the aim of this task is:

  • To build an understanding and perspective of current hot topics in Network Security; and
  • To build generic skills including, but not limited to
    • A capacity for teamwork and collaboration
    • An ability for critical thinking, analysis and problem solving
    • Gaining or improvinginformation technological literacy
    • A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.

Topic Set 

1.      The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)

2.      The future of internet anonymity services, such as Tor, given the recent revelations of NSA hacking on a global scale

3.      Encrypting more and more internet services with SSL (HTTPS) by default

4.      The security risks around BYOD (Bring Your Own Device) in the workplace

5.      The security risks around using Cloud Computing

6.      The security risks to critical infrastructure (such as power, communication, water) from malicious cyber attacks

7.      Offering financial rewards for finding security vulnerabilities in software

Your submission

You are required to prepare and submit a report on your topic to address the following questions:

1.      Summarize the topic and the issues discussed. Discuss how your own posts contributed to this knowledge.

2.      Based on your own research, discuss whether or not the summary presented in (1) is accurate.

3.      Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Explain why you view this issue/these issues as important.

4.      Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Task 2: Security Infrastructure and Protocols

a)      PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust. 

b)      The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base .

Task 3: Security Primitives

a)      Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

b)      What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c)      Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.


Attachment:- Assignment.docx

Reference no: EM13316127

Questions Cloud

Determine the tensions in the cables and the reactions : The suspended load exerts a force F = 600 lb at A and bar OA weighs 200 lb. Assume that the bar's weight acts at its midpoint. Determine the tensions in the cables and the reactions at the ball and socket support O.
Evaluate the characteristics of an effective entrepreneur : The Entrepreneur is usually regarded in business as a person of many valuable characteristics. Critically evaluate the characteristics of an effective entrepreneur giving relevant examples where possible.
Scenarios demonstrates the concept of free-riding : A school fundraiser raffles off a free trip to Hawaii. Many people purchase raffle tickets, but there is only one winner.
What wil be the linear speed of the free end at this instant : A uniform rod of mass m and length l is kept vertical with the lower end clamped. What wil be the linear speed of the free end at this instant
What is relationship between hashing and digital signatures : The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)
The advantages and disadvantages of livingg in a centrally : Explore The Advantages and disadvantages of livingg in a Centrally Planned Economy and the impacts they have on the citizens that live there.
What does the golf ballweigh : A croquet ball weight 460 g.Together a golf ball and a croquet ballweigh the same as eleven golf balls.What does the golf ballweigh?
Develop a marketing plan for a small coffee shop : Develop a marketing plan for a small and independent coffee shop that she wishes to open in Peterborough and proposed coffee shop and the tactical marketing plan should be in line with this target. You might also include Porter's generic strategy.
We can examine the effects of a subsidy with a simple supply : We can examine the effects of a subsidy with a simple supply and demand model. Suppose the graph below shows the market for kerosene in Indonesia. The line labeled S1 represents

Reviews

Write a Review

JAVA Programming Questions & Answers

  Recursive factorial program

Write a class Array that encapsulates an array and provides bounds-checked access. Create a recursive factorial program that prompts the user for an integer N and writes out a series of equations representing the calculation of N!.

  Hunt the wumpus game

Reprot on Hunt the Wumpus Game has Source Code listing, screen captures and UML design here and also, may include Javadoc source here.

  Create a gui interface

Create GUI Interface in java programing with these function: Sort by last name and print all employees info, Sort by job title and print all employees info, Sort by weekly salary and print all employees info, search by job title and print that emp..

  Plot pois on a graph

Write a JAVA program that would get the locations of all the POIs from the file and plot them on a map.

  Write a university grading system in java

University grading system maintains number of tables to store, retrieve and manipulate student marks. Write a JAVA program that would simulate a number of cars.

  Wolves and sheep: design a game

This project is designed a game in java. you choose whether you'd like to write a wolf or a sheep agent. Then, you are assigned to either a "sheep" or a "wolf" team.

  Build a graphical user interface for displaying the image

Build a graphical user interface for displaying the image groups (= cluster) in JMJRST. Design and implement using a Swing interface.

  Determine the day of the week for new year''s day

This assignment contains a java project. Project evaluates the day of the week for New Year's Day.

  Write a java windowed application

Write a Java windowed application to do online quiz on general knowledge and the application also displays the quiz result.

  Input pairs of natural numbers

Java program to input pairs of natural numbers.

  Create classes implement java interface

Interface that contains a generic type. Create two classes that implement this interface.

  Java class, array, link list , generic class

These 14 questions covers java class, Array, link list , generic class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd