Which will encrypt each users data in a file

Assignment Help Computer Network Security
Reference no: EM13329015

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the cryptographic consultant for the project, do you think this is a good choice or not? You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

Reference no: EM13329015

Questions Cloud

What equal annual deposits must be made at : What equal annual deposits must be made at t=2,3,4,5,8,9 and in 10 in order to accumulate $40,000 at t=15 if money is worth 10% compounded annually?
What is the purpose of the diffie-hellman algorithm : Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
Explain a buffer solution contains 0.71 mol of boric acid : A buffer solution contains 0.71 mol of boric acid (H3BO3) and 0.53 mol of sodium dihydrogen borate (NaH2BO3) in 4.00 L. The Ka of boric acid (H3BO3) is Ka = 5.8e-10. What is the pH of the buffer after the addition of 0.50 mol of NaOH
What amount should be paid for the bond : Mr.Fritz wishes to purchase a bond having a face value of $1000 and a bond rate of 8% payable annually. The bond has a remaining life of 12 years. In order to earn 10% rate of return on the investment, what amount should be paid for the bond?
Which will encrypt each users data in a file : Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.
What is the minimum number of bonds the firm must sell : The MerryWeather Firm wants to raise $15 million to expand its business. To accomplish this, the firm plans to sell 10-year, $1,000 face value zero-coupon bonds. The bonds will be priced to yield 4 percent
Find out the molar enthalpy of vaporization : At two temperatures, 85 K and 135 K, the vapor pressures of a certain liquid were found to be 540 Torr and 830 Torr, respectively. From this information, determine the molar enthalpy of vaporization
What will happen to the price of corn oil : If the demand of corm increases do to it use as an altenative engery source, what will happen to supply of corn substitute such as soybean? what will happen to the price of corn oil?
What is the implicit interest for first year of bonds life : A zero coupon bond with a face value of $1,000 is issued with an initial price of $440.50. The bond matures in 15 years. What is the implicit interest, in dollars, for the first year of the bond's life

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  To ensure the security of the files used by the new web site

To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain a..

  Mini case: cisco systems

Mini Case: Cisco Systems

  Security vulnerabilities of authentication scheme

Clinet's MAC address is explicitly excluded in the AP/router configuration. What are the security vulnerabilities of this authentication scheme?

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  What if ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd