Which will encrypt each users data in a file

Assignment Help Computer Network Security
Reference no: EM13329015

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the cryptographic consultant for the project, do you think this is a good choice or not? You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

Reference no: EM13329015

Questions Cloud

What equal annual deposits must be made at : What equal annual deposits must be made at t=2,3,4,5,8,9 and in 10 in order to accumulate $40,000 at t=15 if money is worth 10% compounded annually?
What is the purpose of the diffie-hellman algorithm : Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
Explain a buffer solution contains 0.71 mol of boric acid : A buffer solution contains 0.71 mol of boric acid (H3BO3) and 0.53 mol of sodium dihydrogen borate (NaH2BO3) in 4.00 L. The Ka of boric acid (H3BO3) is Ka = 5.8e-10. What is the pH of the buffer after the addition of 0.50 mol of NaOH
What amount should be paid for the bond : Mr.Fritz wishes to purchase a bond having a face value of $1000 and a bond rate of 8% payable annually. The bond has a remaining life of 12 years. In order to earn 10% rate of return on the investment, what amount should be paid for the bond?
Which will encrypt each users data in a file : Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.
What is the minimum number of bonds the firm must sell : The MerryWeather Firm wants to raise $15 million to expand its business. To accomplish this, the firm plans to sell 10-year, $1,000 face value zero-coupon bonds. The bonds will be priced to yield 4 percent
Find out the molar enthalpy of vaporization : At two temperatures, 85 K and 135 K, the vapor pressures of a certain liquid were found to be 540 Torr and 830 Torr, respectively. From this information, determine the molar enthalpy of vaporization
What will happen to the price of corn oil : If the demand of corm increases do to it use as an altenative engery source, what will happen to supply of corn substitute such as soybean? what will happen to the price of corn oil?
What is the implicit interest for first year of bonds life : A zero coupon bond with a face value of $1,000 is issued with an initial price of $440.50. The bond matures in 15 years. What is the implicit interest, in dollars, for the first year of the bond's life

Reviews

Write a Review

Computer Network Security Questions & Answers

  Methods to combat technical-nontechnical attacks in wan

Explain a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks.

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  What category information is collected by the site

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Virtualization software and operating systems

Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd