Security impact of not having a public key infrastructure, Computer Networking

Assignment Help:

(a) You are provided with the following:

A. An RSA facility complete with public/private key pair
B. A CBC (cipher block chaining) facility incorporating the IDEA block cipher
C. A message digest facility employing the MD5 algorithm

(i) You are required to send a block of data of size 1 MByte through an insecure network to a recipient who knows the message digest algorithm you are using, your secret key in IDEA and your RSA public key. Explain how you would use your security facilities (each facility for one operation) to provide the security services of privacy, message integrity and source authentication.

(ii) How would you achieve the above if the RSA facility were not available?

(iii) Discuss the relative security strengths of your solutions to (i) and (ii)

(b) (i) Name five functions that should be provided by a public key infrastructure.

(ii) Is it possible to operate a public key security system without a public key infrastructure? Justify your answer.

(iii) Discuss the security impact of not having a public key infrastructure.


Related Discussions:- Security impact of not having a public key infrastructure

In formation sharing at regular intervals, In formation  sharing at  regu...

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

Internet service provider (isp), Internet  Service Provider (ISP) Thi...

Internet  Service Provider (ISP) This  supper fast  network  spanning  the world  from  one major  metropolitan area to another  is provided  by a handful of national internet

Full form of httpd, Full form of HTTPd It stands for HTTP daemon. HT...

Full form of HTTPd It stands for HTTP daemon. HTTPd is the program run on a UNIX platform to establish a Web server. On other platforms, such as Microsoft Windows NT, the We

What is a protocol, What is a protocol? The term protocol refers to a s...

What is a protocol? The term protocol refers to a set of rules and process that govern the transmission of messages over a physical networking medium. The most common network p

Firewall architectures-screened host architecture, Screened Host Architectu...

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

Connection-oriented service, The connection-oriented service process for ne...

The connection-oriented service process for networking is same to the manner in which telephones are used. This is shown as follows: A caller dials a number of the receiver. The

What is bandwidth, Question 1 What is bandwidth?                         >...

Question 1 What is bandwidth?                         >>What is the bandwidth of                            a) Telephone signal                            b) Commercial radio broa

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd