What is meant by certificate revocation, Computer Network Security

QUESTION

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization?

(b) Give one possible use of the "extensions" field of an X.509 certificate

(c) Users in a PKI can obtain digital certificates of users they want to communicate with. Which protocol is typically used to interact with the directory server to obtain certificate(s)?

(d) Calculate the RSA public and private keys given the values of p and q as follows: p = 17; q = 11. Show details of workings. Choose e = 7

(e) What is meant by Certificate Revocation? When would a certificate have to be revoked?

(f) Alice and Bob are communicating

  1. Explain how Alice and Bob can communicate such that all their communication can be authenticated and can be verified for integrity. Confidentiality is not required
  2. Modify your answer such that now it also provides replay attack detection
Posted Date: 11/23/2013 1:21:31 AM | Location : United States







Related Discussions:- What is meant by certificate revocation, Assignment Help, Ask Question on What is meant by certificate revocation, Get Answer, Expert's Help, What is meant by certificate revocation Discussions

Write discussion on What is meant by certificate revocation
Your posts are moderated
Related Questions
Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur