What is relationship between hashing and digital signatures

Assignment Help JAVA Programming
Reference no: EM13316127

Task 1.Online Discussions

Below are listed a set of topics. You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

  • Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
  • Raise questions about the information provided by other students (this must be done in an adequately professional manner)
  • Respond to questions raised about your own information and other student's
  • Contribute to discussions in general

Note that the aim of this task is:

  • To build an understanding and perspective of current hot topics in Network Security; and
  • To build generic skills including, but not limited to
    • A capacity for teamwork and collaboration
    • An ability for critical thinking, analysis and problem solving
    • Gaining or improvinginformation technological literacy
    • A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.

Topic Set 

1.      The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)

2.      The future of internet anonymity services, such as Tor, given the recent revelations of NSA hacking on a global scale

3.      Encrypting more and more internet services with SSL (HTTPS) by default

4.      The security risks around BYOD (Bring Your Own Device) in the workplace

5.      The security risks around using Cloud Computing

6.      The security risks to critical infrastructure (such as power, communication, water) from malicious cyber attacks

7.      Offering financial rewards for finding security vulnerabilities in software

Your submission

You are required to prepare and submit a report on your topic to address the following questions:

1.      Summarize the topic and the issues discussed. Discuss how your own posts contributed to this knowledge.

2.      Based on your own research, discuss whether or not the summary presented in (1) is accurate.

3.      Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Explain why you view this issue/these issues as important.

4.      Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Task 2: Security Infrastructure and Protocols

a)      PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust. 

b)      The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base .

Task 3: Security Primitives

a)      Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

b)      What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c)      Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.


Attachment:- Assignment.docx

Reference no: EM13316127

Questions Cloud

Determine the tensions in the cables and the reactions : The suspended load exerts a force F = 600 lb at A and bar OA weighs 200 lb. Assume that the bar's weight acts at its midpoint. Determine the tensions in the cables and the reactions at the ball and socket support O.
Evaluate the characteristics of an effective entrepreneur : The Entrepreneur is usually regarded in business as a person of many valuable characteristics. Critically evaluate the characteristics of an effective entrepreneur giving relevant examples where possible.
Scenarios demonstrates the concept of free-riding : A school fundraiser raffles off a free trip to Hawaii. Many people purchase raffle tickets, but there is only one winner.
What wil be the linear speed of the free end at this instant : A uniform rod of mass m and length l is kept vertical with the lower end clamped. What wil be the linear speed of the free end at this instant
What is relationship between hashing and digital signatures : The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)
The advantages and disadvantages of livingg in a centrally : Explore The Advantages and disadvantages of livingg in a Centrally Planned Economy and the impacts they have on the citizens that live there.
What does the golf ballweigh : A croquet ball weight 460 g.Together a golf ball and a croquet ballweigh the same as eleven golf balls.What does the golf ballweigh?
Develop a marketing plan for a small coffee shop : Develop a marketing plan for a small and independent coffee shop that she wishes to open in Peterborough and proposed coffee shop and the tactical marketing plan should be in line with this target. You might also include Porter's generic strategy.
We can examine the effects of a subsidy with a simple supply : We can examine the effects of a subsidy with a simple supply and demand model. Suppose the graph below shows the market for kerosene in Indonesia. The line labeled S1 represents

Reviews

Write a Review

JAVA Programming Questions & Answers

  Write a java that reads from the user annual income

Write a Java program (name it IncomeTax) that reads from the user annual income as  integer value.

  Setting up the form page

Download and save the attached comment CGI mailer script form-mail2.pl to your server's cgi-bin directory, and change the permissions on the script to make it executable (not writable).

  Point class that represents points on an x, y axis

Write a Point class that represents points on an x, y axis. The data members should be doubles x and y plus an int value called count that represents the number of points currently instantiated

  Graphicsframe class

This program makes use of the GraphicsFrame class and the Drawable interface. Your missions is to create the class Airplane. Each Airplane object should store the following information (fields): manufacturer modelNumber maximumSpeed // in knots maxim..

  Statements to print a label

Add the statements to print a label in the following format (the numbers in the example output are correct for input of $4.25 per pound and 41 ounces). Use the formatting object money to print the unit price and total price and the formatting object ..

  Initialized the array of words by an assignment statement.

modify the following program . The program from Lab 4 initialized the array of words by an assignment statement.

  Luminous jewels - the polishing game

Once a jewel type is removed from the necklace, all other instances of the same jewel type is treated as polished by the person who removed the jewel

  Explain we have to make a project in java

We have to make a project in java . This is a small deskstop application no specifications given so far . The CD store has CD games and music we can rent a cd or we can buy . This is all we need to develop.

  Computing the time complexity using the big-o notation

You are required to calculate the time complexity using the big-O notation of the Algorithm_2 given by the following methods defined by the following Java code.

  Develop a program that will handle a golfer and his scores

develop a program that will handle a Golfer and his scores. The program will be comprised of two classes: a Golfer class that will manage all the golfer's scores and a Score class.This is a class designed to represent a golfer including his name, hom..

  Solving programming problems

Write a computer program that will figure out the total of an order when given the amount of the order ($1000) and a sales tax rate of eight percent.

  The sixth amendment allows the due process right to council

The Sixth Amendment allows the due process right to council. Several Supreme Court cases have clarified this right for those who cannot afford their own attorneys. Discuss the right to an attorney for indigent defendants. What are the three main syst..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd