What is meant by certificate revocation, Computer Network Security


(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization?

(b) Give one possible use of the "extensions" field of an X.509 certificate

(c) Users in a PKI can obtain digital certificates of users they want to communicate with. Which protocol is typically used to interact with the directory server to obtain certificate(s)?

(d) Calculate the RSA public and private keys given the values of p and q as follows: p = 17; q = 11. Show details of workings. Choose e = 7

(e) What is meant by Certificate Revocation? When would a certificate have to be revoked?

(f) Alice and Bob are communicating

  1. Explain how Alice and Bob can communicate such that all their communication can be authenticated and can be verified for integrity. Confidentiality is not required
  2. Modify your answer such that now it also provides replay attack detection
Posted Date: 11/23/2013 1:21:31 AM | Location : United States

Related Discussions:- What is meant by certificate revocation, Assignment Help, Ask Question on What is meant by certificate revocation, Get Answer, Expert's Help, What is meant by certificate revocation Discussions

Write discussion on What is meant by certificate revocation
Your posts are moderated
Related Questions
What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w