What is meant by certificate revocation, Computer Network Security


(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization?

(b) Give one possible use of the "extensions" field of an X.509 certificate

(c) Users in a PKI can obtain digital certificates of users they want to communicate with. Which protocol is typically used to interact with the directory server to obtain certificate(s)?

(d) Calculate the RSA public and private keys given the values of p and q as follows: p = 17; q = 11. Show details of workings. Choose e = 7

(e) What is meant by Certificate Revocation? When would a certificate have to be revoked?

(f) Alice and Bob are communicating

  1. Explain how Alice and Bob can communicate such that all their communication can be authenticated and can be verified for integrity. Confidentiality is not required
  2. Modify your answer such that now it also provides replay attack detection
Posted Date: 11/23/2013 1:21:31 AM | Location : United States

Related Discussions:- What is meant by certificate revocation, Assignment Help, Ask Question on What is meant by certificate revocation, Get Answer, Expert's Help, What is meant by certificate revocation Discussions

Write discussion on What is meant by certificate revocation
Your posts are moderated
Related Questions
Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

on LAN,where are IP datagrams transported?

Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

UDP DATAGRAM FORMAT: It is given in the figure below:

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

implementing password policy in organisation

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I