Briefly list functions of a public key infrastructure, Computer Network Security

Assignment Help:

Question:

(a) What is the major problem with public key encryption when compared to symmetric key encryption?

(b) Consider the following protocol for communication between two parties, for example, user A wishing to send message M  to user B (messages exchanged are in the format (sender's name, text, receiver's name)):

A sends to B the following block: (A, Ekub[M, A]), B).

B acknowledges receipt by sending to A the following block: (B, Ekua([M, B]), A).

The above protocol is criticized to contain a certain redundancy and is simplified to the following:

A sends B the block: (A, Ekub (M), B).

B acknowledges receipt by sending to A the block: (B, Ekua (M), A).

Describe how the simplified version  of the protocol allows another user (attacker) of the network (has his own public encryption key pair and is able to send his own messages to A or B and to receive theirs) to obtain message M, which user A has previously sent to B. Explain why this attack is not successful in the original protocol. 

(c) Briefly list four functions of a public key infrastructure (PKI).

(d) Which entity can assist the certificate authority in the PKI certificate process?

(e) Which protocol allows to verify whether a certificate has been revoked or not?


Related Discussions:- Briefly list functions of a public key infrastructure

RESPONSE, Dropbox’s tool shows how chatbots could be future of cybersecurit...

Dropbox’s tool shows how chatbots could be future of cybersecurity

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Malicious node detection mechanisms, Many applications are vulnerable to in...

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

The security systems development life cycle (secsdlc), The Security Systems...

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

What is information security, What is information security Information s...

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Briefly explain the contents of the needs analysis, QUESTION (a) Brief...

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Determine the functions of security components, You are designing a Demilit...

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

Ids-information security, IDS Intrusion is a attack on information assets...

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd