Estimate the number of decimal digits of the keys

Assignment Help Computer Network Security
Reference no: EM131026957

Assignment 1: Cryptography

Question 1: Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be.

In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Your report should be maximum 2 pages and should contain relevant tables, calculations, a ranked list of threats (in terms of impact) and conclusions.

See the scoring sheet for this assignment, and ensure that your report fulfils the criteria listed.

Question 2: You are required to learn the GPG/PGP package (learning the applications of private and public key cryptography to secure email messages and documents) to be able to answer the following questions. You should pair up with one of your class fellow to do this lab and record results and give commentary on the results.

a) Generate keys of 3 different sizes for RSA encryption scheme and include these keys in the report.

b) Check the key files and estimate the number of decimal digits of the keys and write your estimates.

c) Encrypt a file (text or binary) using 3 key sizes and include your results and note the observation

d) Explain why GPG encryption and decryption are quite fast.

e) Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10MBs of data.

f) Export your public key and discuss the reason why your exported key should be in ASCII format.

g) Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

h) You should work with your class fellow to do this experiment and record your observation in the form of commands being used or procedure being followed and includeyour results.

I. Exchange your public key and your friend's public key using email.

II. Import your friend's public key into your key ring.

III. Encrypt a file using your friend's public key and send the encrypted file to your friend.

IV. Ask your friend to decrypt the encrypted file.

V. You can ask your friend to do the same thing.

i) Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents.

Reference no: EM131026957

Questions Cloud

How sustainable is sustainable tourism : How sustainable is sustainable tourism - Are capitalism and conservation compatible and examination of the implications of radically reducing oil dependency.
How would you prove the converse : Let S be the set of integers. If a, b ε S, define aRb if a + b is even. Prove that R is an equivalence relation and determine the equivalence classes of S.
What is the average velocity if the diameter changes to six : What is the average velocity if the diameter changes to 6 in.? b. Express the average velocity in terms of an arbitrary diameter.
What are the dimensions of the photo : A rectangular parking lot is 100 ft longer than it is wide. Determine the dimensions of the parking lot if it measures 500 ft diagonally.
Estimate the number of decimal digits of the keys : Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents - Encrypt a file and output the cipher text in ASCII format.
Prepare a contribution format income statement : Prepare an income statement for the month using absorption costing.
Analysis of systems translational and rotational velocities : Design a dampener such that the amplitude reduces to 10% of the initial after 2 oscillation with the same initial frequency -
How much did he budget for all bills : Jeff Bagwell of the Houston Astros has 104 hits in305 times at bat. Matt Williams of a Arizona team has 88 hits in 275 times at bat. Do they have the same batting average
Generate tax shields from depreciation : The company is assumed to earn sufficient revenues to generate tax shields from depreciation. Should Pilot Plus Pens replace the old machine now or at the end of five years?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  Case study- network infrastructure vulnerabilities

Case Study- Network Infrastructure Vulnerabilities, You are the Information Security Officer at a medium-sized company (1,500 employees)

  Compare and contrast online analytic processing

Write a one page paper (250 words) on Compare and contrast Online Analytic Processing (OLAP) and Online Transaction Processing (OLTP); also discuss Codd's rules for TP databases and OLAP databases (New Times Roman, 12 pt, double spaced, Essay). Ci..

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  How does a security framework assist or affect

How does a security framework assist or affect in the design and implementation of a security infrastructure? Detail information security governance and what organizations and personnel will use it

  Using cbc mode of operation what are consequences

Using CBC mode of operation what are the consequences of decrypting the cipher text if it has an error in the first bit of the first block C?

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Describe the impact and the vulnerability of the scada

Describe the impact and the vulnerability of the SCADA/Stuxnet Worm on the critical infrastructure of the United States and describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.

  Potential physical threats that require attention

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd