Briefly list functions of a public key infrastructure, Computer Network Security

Assignment Help:

Question:

(a) What is the major problem with public key encryption when compared to symmetric key encryption?

(b) Consider the following protocol for communication between two parties, for example, user A wishing to send message M  to user B (messages exchanged are in the format (sender's name, text, receiver's name)):

A sends to B the following block: (A, Ekub[M, A]), B).

B acknowledges receipt by sending to A the following block: (B, Ekua([M, B]), A).

The above protocol is criticized to contain a certain redundancy and is simplified to the following:

A sends B the block: (A, Ekub (M), B).

B acknowledges receipt by sending to A the block: (B, Ekua (M), A).

Describe how the simplified version  of the protocol allows another user (attacker) of the network (has his own public encryption key pair and is able to send his own messages to A or B and to receive theirs) to obtain message M, which user A has previously sent to B. Explain why this attack is not successful in the original protocol. 

(c) Briefly list four functions of a public key infrastructure (PKI).

(d) Which entity can assist the certificate authority in the PKI certificate process?

(e) Which protocol allows to verify whether a certificate has been revoked or not?


Related Discussions:- Briefly list functions of a public key infrastructure

Plaintext, how to encryt the data in plaintext cipher

how to encryt the data in plaintext cipher

Security analysis-information security, SECURITY ANALYSIS Overview •    ...

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Information classification, INFORMATION CLASSIFICATION The classificatio...

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

Network simplex method, QUESTION: (a) Briefly explain the steps invol...

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

What do you understand by demilitarized zone, Problem 1: What does the ...

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Softbank theft of consumer data -information security, Example : Softbank –...

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Routing protocol for a banking network, You have been asked to design a Ban...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Programming, SDES encryption and decryption

SDES encryption and decryption

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd