Briefly list functions of a public key infrastructure, Computer Network Security

Assignment Help:

Question:

(a) What is the major problem with public key encryption when compared to symmetric key encryption?

(b) Consider the following protocol for communication between two parties, for example, user A wishing to send message M  to user B (messages exchanged are in the format (sender's name, text, receiver's name)):

A sends to B the following block: (A, Ekub[M, A]), B).

B acknowledges receipt by sending to A the following block: (B, Ekua([M, B]), A).

The above protocol is criticized to contain a certain redundancy and is simplified to the following:

A sends B the block: (A, Ekub (M), B).

B acknowledges receipt by sending to A the block: (B, Ekua (M), A).

Describe how the simplified version  of the protocol allows another user (attacker) of the network (has his own public encryption key pair and is able to send his own messages to A or B and to receive theirs) to obtain message M, which user A has previously sent to B. Explain why this attack is not successful in the original protocol. 

(c) Briefly list four functions of a public key infrastructure (PKI).

(d) Which entity can assist the certificate authority in the PKI certificate process?

(e) Which protocol allows to verify whether a certificate has been revoked or not?


Related Discussions:- Briefly list functions of a public key infrastructure

Nstissc security model, NSTISSC SECURITY MODEL The NSTISSC Security Model ...

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Ids-information security, IDS Intrusion is a attack on information assets...

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Ip address, How to find an ip address?

How to find an ip address?

Assignment, Hello i have submitted an assignment and i am still waiting to ...

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

Question, Describe the process a proposed standard goes through to become a...

Describe the process a proposed standard goes through to become an RFC

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Explain what is a broadcast storm, QUESTION: (a) Ethernet has grown in ...

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd