Security impact of not having a public key infrastructure, Computer Networking

Assignment Help:

(a) You are provided with the following:

A. An RSA facility complete with public/private key pair
B. A CBC (cipher block chaining) facility incorporating the IDEA block cipher
C. A message digest facility employing the MD5 algorithm

(i) You are required to send a block of data of size 1 MByte through an insecure network to a recipient who knows the message digest algorithm you are using, your secret key in IDEA and your RSA public key. Explain how you would use your security facilities (each facility for one operation) to provide the security services of privacy, message integrity and source authentication.

(ii) How would you achieve the above if the RSA facility were not available?

(iii) Discuss the relative security strengths of your solutions to (i) and (ii)

(b) (i) Name five functions that should be provided by a public key infrastructure.

(ii) Is it possible to operate a public key security system without a public key infrastructure? Justify your answer.

(iii) Discuss the security impact of not having a public key infrastructure.


Related Discussions:- Security impact of not having a public key infrastructure

The received message - application layer , The Received Message If  we...

The Received Message If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message wit

Describe the term disaster management as security threats, Describe the ter...

Describe the term Disaster Management as security threats Making and testing backups regularly could be the simplest and easiest of all the security measures. But a new questio

Explain design issues of interconnection network, Design Issues Of Intercon...

Design Issues Of Interconnection Network Below are the issues, which must be considered when designing an interconnection network. 1)  Size and Dimension of network:  It m

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Calculate the amplifier''s gain in db, Quetion: An amplifier increases ...

Quetion: An amplifier increases the peak-to-peak voltage of a signal from 1 V to 20 V. What is the amplifier's gain in dB?

Layer of security, Other than performance  issues, there could be security ...

Other than performance  issues, there could be security reasons for using something like xinetd.  Make simple design in which a new version of xinetd gives a layer of security.

What is a database server, What is a Database Server? With a database s...

What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of every SQL command are returned over the net

System inheritance.., what is inheritance in computer systems special permi...

what is inheritance in computer systems special permissions?

Determine the maximum output current, A logic gate drives a load, which has...

A logic gate drives a load, which has a resistance of 1 kÙ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd