Estimate the number of decimal digits of the keys

Assignment Help Computer Network Security
Reference no: EM131026957

Assignment 1: Cryptography

Question 1: Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be.

In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Your report should be maximum 2 pages and should contain relevant tables, calculations, a ranked list of threats (in terms of impact) and conclusions.

See the scoring sheet for this assignment, and ensure that your report fulfils the criteria listed.

Question 2: You are required to learn the GPG/PGP package (learning the applications of private and public key cryptography to secure email messages and documents) to be able to answer the following questions. You should pair up with one of your class fellow to do this lab and record results and give commentary on the results.

a) Generate keys of 3 different sizes for RSA encryption scheme and include these keys in the report.

b) Check the key files and estimate the number of decimal digits of the keys and write your estimates.

c) Encrypt a file (text or binary) using 3 key sizes and include your results and note the observation

d) Explain why GPG encryption and decryption are quite fast.

e) Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10MBs of data.

f) Export your public key and discuss the reason why your exported key should be in ASCII format.

g) Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

h) You should work with your class fellow to do this experiment and record your observation in the form of commands being used or procedure being followed and includeyour results.

I. Exchange your public key and your friend's public key using email.

II. Import your friend's public key into your key ring.

III. Encrypt a file using your friend's public key and send the encrypted file to your friend.

IV. Ask your friend to decrypt the encrypted file.

V. You can ask your friend to do the same thing.

i) Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents.

Reference no: EM131026957

Questions Cloud

How sustainable is sustainable tourism : How sustainable is sustainable tourism - Are capitalism and conservation compatible and examination of the implications of radically reducing oil dependency.
How would you prove the converse : Let S be the set of integers. If a, b ε S, define aRb if a + b is even. Prove that R is an equivalence relation and determine the equivalence classes of S.
What is the average velocity if the diameter changes to six : What is the average velocity if the diameter changes to 6 in.? b. Express the average velocity in terms of an arbitrary diameter.
What are the dimensions of the photo : A rectangular parking lot is 100 ft longer than it is wide. Determine the dimensions of the parking lot if it measures 500 ft diagonally.
Estimate the number of decimal digits of the keys : Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents - Encrypt a file and output the cipher text in ASCII format.
Prepare a contribution format income statement : Prepare an income statement for the month using absorption costing.
Analysis of systems translational and rotational velocities : Design a dampener such that the amplitude reduces to 10% of the initial after 2 oscillation with the same initial frequency -
How much did he budget for all bills : Jeff Bagwell of the Houston Astros has 104 hits in305 times at bat. Matt Williams of a Arizona team has 88 hits in 275 times at bat. Do they have the same batting average
Generate tax shields from depreciation : The company is assumed to earn sufficient revenues to generate tax shields from depreciation. Should Pilot Plus Pens replace the old machine now or at the end of five years?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  What is the length of the data field (in hexadecimal)

What is the Destination Address (in hexadecimal)?

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Describe how the mix of state and non-state actors

Describe how the mix of state and non-state actors you identified should affect policy maker decision-making and policy development for critical infrastructure protection.

  About inf 620

How well did the systems approach work for the initial stages of the Primis system?What could the team have done differently in the preliminary stages? How might this have affected the endresult?

  Develop intellectual property violation reporting procedures

Develop intellectual property violation reporting procedures and Develop intellectual property infringement ramifications

  Compile a full draft of the final enterprise security plan

Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.

  What kind of environment is being faced by cybersecurity

Why will the policy decisions faced by a telecommunication executive be very different from the policy decisions faced by a military strategist? What kind of environment is being faced by cybersecurity decision makers

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd