Security impact of not having a public key infrastructure, Computer Networking

Assignment Help:

(a) You are provided with the following:

A. An RSA facility complete with public/private key pair
B. A CBC (cipher block chaining) facility incorporating the IDEA block cipher
C. A message digest facility employing the MD5 algorithm

(i) You are required to send a block of data of size 1 MByte through an insecure network to a recipient who knows the message digest algorithm you are using, your secret key in IDEA and your RSA public key. Explain how you would use your security facilities (each facility for one operation) to provide the security services of privacy, message integrity and source authentication.

(ii) How would you achieve the above if the RSA facility were not available?

(iii) Discuss the relative security strengths of your solutions to (i) and (ii)

(b) (i) Name five functions that should be provided by a public key infrastructure.

(ii) Is it possible to operate a public key security system without a public key infrastructure? Justify your answer.

(iii) Discuss the security impact of not having a public key infrastructure.


Related Discussions:- Security impact of not having a public key infrastructure

Characteristic of store and forward switches, Write the characteristic of S...

Write the characteristic of Store and Forward switches? A)     Store and Forward switch will not forward fragments. B)      The longer the frame, the longer the delay (latenc

Explain the cost of a path between two nodes, Explain the cost of a path be...

Explain the cost of a path between two nodes Given a network of nodes linked by bidirectional links, where every link has a cost associated with it in each direction, explain t

What are all the base services provided by the os, What are all the Base se...

What are all the Base services provided by the OS? Interprocess communications (IPC) Task preemption Task priority Local/Remote Interprocess communication Semaphor

Firewalls - point to point, Firewalls After several  security  related ...

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

What do you understand by service access point, Q. How two adjacent layers ...

Q. How two adjacent layers communicate in a layered network or what do you understand by Service Access Point? Ans: In layered network, each layer has several entities and enti

Sonet sdh , SONET SDH To satisfy the  requirements  of ever inc...

SONET SDH To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utili

Test network connections between any two pcs, Use Packet Tracer software to...

Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly. The following requirements should be met:

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd