Briefly list functions of a public key infrastructure, Computer Network Security


(a) What is the major problem with public key encryption when compared to symmetric key encryption?

(b) Consider the following protocol for communication between two parties, for example, user A wishing to send message M  to user B (messages exchanged are in the format (sender's name, text, receiver's name)):

A sends to B the following block: (A, Ekub[M, A]), B).

B acknowledges receipt by sending to A the following block: (B, Ekua([M, B]), A).

The above protocol is criticized to contain a certain redundancy and is simplified to the following:

A sends B the block: (A, Ekub (M), B).

B acknowledges receipt by sending to A the block: (B, Ekua (M), A).

Describe how the simplified version  of the protocol allows another user (attacker) of the network (has his own public encryption key pair and is able to send his own messages to A or B and to receive theirs) to obtain message M, which user A has previously sent to B. Explain why this attack is not successful in the original protocol. 

(c) Briefly list four functions of a public key infrastructure (PKI).

(d) Which entity can assist the certificate authority in the PKI certificate process?

(e) Which protocol allows to verify whether a certificate has been revoked or not?

Posted Date: 11/15/2013 4:13:25 AM | Location : United States

Related Discussions:- Briefly list functions of a public key infrastructure, Assignment Help, Ask Question on Briefly list functions of a public key infrastructure, Get Answer, Expert's Help, Briefly list functions of a public key infrastructure Discussions

Write discussion on Briefly list functions of a public key infrastructure
Your posts are moderated
Related Questions
types of firewall and backup

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Normal 0 false false false EN-US X-NONE X-NONE

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP