What is the important benefit of asymmetrical encryption

Assignment Help Theory of Computation
Reference no: EM131918676

1. What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption
a. It speeds up the encryption process.
b. It makes e-mail easier to encode.
c. Only the sender knows to whom the information is going.
d. Messages can be transmitted openly and only the receiver can decrypt the information

2. Which part of CAIN is realized through the use of message digest functions and hashes?
a. confidentiality
b. authenticity
c. integrity
d. non-repudiation

3. What defines the strength of a cryptographic method?
a. number of shifts
b. need for a code book
c. complexity of the algorithm
d. length of time needed to crack it

4. Cryptography is related to mathematics because _______.
a. the functions of mathematics have cryptographic properties
b. logarithms can cause convergence of numbers
c. mathematics is simple and easy to use
d. information can be represented as numbers and manipulated mathematically

5. To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a. his/her public key
b. the receiver's public key
c. his/her private key
d. the receiver's private key

6. One should establish access control policies for each part of the information system that is ______________.
a. a high traffic area
b. a high security area
c. a high maintenance area
d. accessible to the public

7. If you are attempting to gain access to restricted information, what is the first thing you should do?
a. kidnap an employee
b. ask for what purpose
c. spoof the server
d. disable the alarm system

8. Justify your answer. [50-100 words]
It is necessary to keep cryptographic algorithms private. True or False

9. Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). What CAIN property is that? Your colleague tells you: "Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E's in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E's, that message is from an imposter." [a,b,c: 2 points, d: 4 points]
a) This number, put at the end of each message, is an example of what cryptographic item?
b) Does it have the characteristic of being one way i.e can you deduce the original message?
c) Is it collision resistant?

Can you suggest some other way to indicate that message is from the sender without encryption?

Verified Expert

In this assignment we have studied about cryptography.Here we have learned How to public key are communicate securely through network .Here we have also studied about how to pass communicate securely by cryptography.Here we have learned about how to do symmetric and asymmetric algorithm.

Reference no: EM131918676

Questions Cloud

Discuss the explanation of the apparent color : Discuss the explanation of the apparent color of an object based on the color of the light illuminating it.
Understanding of science and its processes : Discuss your understanding of science and its processes as compared to the opinion of most (that science is a body of knowledge to be memorized).
What are the components of cost-volume-profit analysis : What are the components of cost-volume-profit (CVP) analysis? How does a CVP income statement help management make decisions?
Reflected in cash budget of firm that is in zero tax bracket : Which of the following is NOT directly reflected in the cash budget of a firm that is in the zero tax bracket?
What is the important benefit of asymmetrical encryption : What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption - Which part of CAIN is realized through
How much power does she generate if she is moving : She reaches the top of the stairs in 5.00 seconds. How much power does she generate if she is moving at 2.76 m/s at the top of the stairs?
Describe the process of globalization and the challenges : Describe the process of globalization and challenges and opportunities it presents to business. Provide an example of a challenge and an example of opportunity.
Calculate the maximum height above the roof : Calculate the maximum height above the roof reached by the rock, the magnitude of the velocity of the rock just before it strikes the ground
Briefly summarize the holding in miranda v arizona : Create your own fact pattern to illustrate how and when law enforcement agents must give the Miranda warnings.

Reviews

Write a Review

Theory of Computation Questions & Answers

  Design unambiguous grammar to parse expressions

Write a program would read two numbers and then print all numbers between the first and the second, inclusive. Design unambiguous grammar to parse expressions

  Find the correct rhs in a right sentential form

Find the correct RHS in a right sentential form - Please describe this well

  Formulate the corresponding demand allocation problem

Extend the CPL model to the case of demand varying over the planning horizon. Assume that, once opened, a facility cannot be closed.

  Compare the use of moore machines versus mealy machines

Compare the use of Moore machines versus Mealy machines in the design of hardware systems and computer software.

  Build a graphic map for your project

You can use any of the techniques mentioned above and use any software application that you like. Don't do it in haste: take your time to analyze, improve, and modify it. Post the answers on the seventh day to your folder.

  Find logical mismatch between predicate and subject

Which sentence has the logical mismatch between predicate and subject? Choose one of options below as your answer: A. Misunderstanding was as he lost directions.

  Write the predicate singlechild

Write the predicate singleChild(Name) which finds the name of single children - For this problem single children means no other child has the same father and mother.

  Discuss the concepts of the lambda-calculus

Describe the basic concepts of the lambda-calculus and explain how it is used to study computability of functions.

  Discuss the process you used in making the decision

Discuss the process you used in making the decision. What ethical theory best reflects the foundation you used to make the decision.

  Find cfgs for the languages

Find CFGs for the languages over the alphabet sigma = {a   b}:

  All binary strings with at least

Give and FA for each of the languages all binary strings with at least three 1''s and all binary strings with at an odd number of 1''s

  Single tape turing machine

Double and Two Tape Turing machines - single tape Turing machine

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd