What is the important benefit of asymmetrical encryption

Assignment Help Theory of Computation
Reference no: EM131918676

1. What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption
a. It speeds up the encryption process.
b. It makes e-mail easier to encode.
c. Only the sender knows to whom the information is going.
d. Messages can be transmitted openly and only the receiver can decrypt the information

2. Which part of CAIN is realized through the use of message digest functions and hashes?
a. confidentiality
b. authenticity
c. integrity
d. non-repudiation

3. What defines the strength of a cryptographic method?
a. number of shifts
b. need for a code book
c. complexity of the algorithm
d. length of time needed to crack it

4. Cryptography is related to mathematics because _______.
a. the functions of mathematics have cryptographic properties
b. logarithms can cause convergence of numbers
c. mathematics is simple and easy to use
d. information can be represented as numbers and manipulated mathematically

5. To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a. his/her public key
b. the receiver's public key
c. his/her private key
d. the receiver's private key

6. One should establish access control policies for each part of the information system that is ______________.
a. a high traffic area
b. a high security area
c. a high maintenance area
d. accessible to the public

7. If you are attempting to gain access to restricted information, what is the first thing you should do?
a. kidnap an employee
b. ask for what purpose
c. spoof the server
d. disable the alarm system

8. Justify your answer. [50-100 words]
It is necessary to keep cryptographic algorithms private. True or False

9. Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). What CAIN property is that? Your colleague tells you: "Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E's in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E's, that message is from an imposter." [a,b,c: 2 points, d: 4 points]
a) This number, put at the end of each message, is an example of what cryptographic item?
b) Does it have the characteristic of being one way i.e can you deduce the original message?
c) Is it collision resistant?

Can you suggest some other way to indicate that message is from the sender without encryption?

Verified Expert

In this assignment we have studied about cryptography.Here we have learned How to public key are communicate securely through network .Here we have also studied about how to pass communicate securely by cryptography.Here we have learned about how to do symmetric and asymmetric algorithm.

Reference no: EM131918676

Questions Cloud

Discuss the explanation of the apparent color : Discuss the explanation of the apparent color of an object based on the color of the light illuminating it.
Understanding of science and its processes : Discuss your understanding of science and its processes as compared to the opinion of most (that science is a body of knowledge to be memorized).
What are the components of cost-volume-profit analysis : What are the components of cost-volume-profit (CVP) analysis? How does a CVP income statement help management make decisions?
Reflected in cash budget of firm that is in zero tax bracket : Which of the following is NOT directly reflected in the cash budget of a firm that is in the zero tax bracket?
What is the important benefit of asymmetrical encryption : What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption - Which part of CAIN is realized through
How much power does she generate if she is moving : She reaches the top of the stairs in 5.00 seconds. How much power does she generate if she is moving at 2.76 m/s at the top of the stairs?
Describe the process of globalization and the challenges : Describe the process of globalization and challenges and opportunities it presents to business. Provide an example of a challenge and an example of opportunity.
Calculate the maximum height above the roof : Calculate the maximum height above the roof reached by the rock, the magnitude of the velocity of the rock just before it strikes the ground
Briefly summarize the holding in miranda v arizona : Create your own fact pattern to illustrate how and when law enforcement agents must give the Miranda warnings.

Reviews

Write a Review

Theory of Computation Questions & Answers

  Finite-state machine design

Create a finite-state machine design to turn your FPGA development board into a simple programmable music box.

  Redundant sequence identi cation

Redundant sequence identi cation

  Compute a shortest superstring

Dynamic programming algorithm to compute a shortest superstring.

  Propositional and predicate logic

Write down a structural induction principle for the PlayTree free type

  Design a syntactic analyzer

Design a syntactic analyzer for the language specified by the grammar

  Design unambiguous grammar to parse expressions

Write a program would read two numbers and then print all numbers between the first and the second, inclusive. Design unambiguous grammar to parse expressions

  Consider a logic function with three outputs

Consider a logic function with three outputs,  A ,  B , and  C , and three inputs,  D ,  E , and  F . The function is defined as follows:  A  is true if at least one input is true,  B  is true

  Considering a single programmed operating system

Considering a single programmed operating system, what is the minimal total time required to complete executions of the two processes? You should explain your answer with a diagram.

  How to construct an nfa

Give a construction that assumes you are given a DFA for L and show how to construct an NFA (with or without ε-moves) to recognize sort(L).

  Equivalence classes to construct minimal dfa for language

How many equivalence classes does this relation have and what are they? Use these equivalence classes to construct the minimal DFA for the language.

  Impact of moore-s law on data center costs

Discuss the impact of Moore's law on data center costs on such things as servers and communications equipment. List at least 3 steps or recommendations your data center can take to offset some or all of the effect of Moore's law.

  Problem encountered in statements in predicate logic

How the problem would be encountered in attempting to represent the following statements in Predicate logic. it should be possible to: John only likes to see French movies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd