What is meant by certificate revocation, Computer Network Security

QUESTION

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization?

(b) Give one possible use of the "extensions" field of an X.509 certificate

(c) Users in a PKI can obtain digital certificates of users they want to communicate with. Which protocol is typically used to interact with the directory server to obtain certificate(s)?

(d) Calculate the RSA public and private keys given the values of p and q as follows: p = 17; q = 11. Show details of workings. Choose e = 7

(e) What is meant by Certificate Revocation? When would a certificate have to be revoked?

(f) Alice and Bob are communicating

  1. Explain how Alice and Bob can communicate such that all their communication can be authenticated and can be verified for integrity. Confidentiality is not required
  2. Modify your answer such that now it also provides replay attack detection
Posted Date: 11/23/2013 1:21:31 AM | Location : United States







Related Discussions:- What is meant by certificate revocation, Assignment Help, Ask Question on What is meant by certificate revocation, Get Answer, Expert's Help, What is meant by certificate revocation Discussions

Write discussion on What is meant by certificate revocation
Your posts are moderated
Related Questions
i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

how can you enter the ASVAB practice test on line?