Briefly list functions of a public key infrastructure, Computer Network Security

Question:

(a) What is the major problem with public key encryption when compared to symmetric key encryption?

(b) Consider the following protocol for communication between two parties, for example, user A wishing to send message M  to user B (messages exchanged are in the format (sender's name, text, receiver's name)):

A sends to B the following block: (A, Ekub[M, A]), B).

B acknowledges receipt by sending to A the following block: (B, Ekua([M, B]), A).

The above protocol is criticized to contain a certain redundancy and is simplified to the following:

A sends B the block: (A, Ekub (M), B).

B acknowledges receipt by sending to A the block: (B, Ekua (M), A).

Describe how the simplified version  of the protocol allows another user (attacker) of the network (has his own public encryption key pair and is able to send his own messages to A or B and to receive theirs) to obtain message M, which user A has previously sent to B. Explain why this attack is not successful in the original protocol. 

(c) Briefly list four functions of a public key infrastructure (PKI).

(d) Which entity can assist the certificate authority in the PKI certificate process?

(e) Which protocol allows to verify whether a certificate has been revoked or not?

Posted Date: 11/15/2013 4:13:25 AM | Location : United States







Related Discussions:- Briefly list functions of a public key infrastructure, Assignment Help, Ask Question on Briefly list functions of a public key infrastructure, Get Answer, Expert's Help, Briefly list functions of a public key infrastructure Discussions

Write discussion on Briefly list functions of a public key infrastructure
Your posts are moderated
Related Questions
Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

briefly expslain type of e-commerce

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete