Explain about hashing and message authentication codes

Assignment Help Computer Network Security
Reference no: EM13185786

Security Primitives

a) Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa? 

b) What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c) Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.

Reference no: EM13185786

Questions Cloud

Why is risk management important : Why is Risk Management important? Discuss. Discuss the common sources of risk on information technology projects and suggestions for managing them.
Find the number of pitchers : Find the number of pitchers that she should produce and the price she should charge in order to maximize profit. Also find the maximum profit.
Explain the longest wavelength transition of the pickering : The pickering series for the He+ ion corresponding to a series of transitions, in which electrons fall into the level with n=4. Find The longest wavelength transition of the pickering series in Angstroms
What quantity of output will a typical firm produce : Market demand is given as QD = 200 - 3P. Market supply is given as QS = 2P + 100. Each identical firm has MC = 0.5Q andATC = 0.25Q. 1.) What quantity of output will a typical firm produce 2.) What is a firm's average total cost 3.) What is each firm..
Explain about hashing and message authentication codes : Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?
Graph on a separate piece of paper : Graph on a separate piece of paper. How many lines of symmetry does have?
State a mutant hemoglobin of the beta chain : A mutant hemoglobin has His146 of the beta chain replaced with a threonine residue. predict what the consequence of this mutation might be. specifically
Theological portraits of jesus : In what ways do the four gospel writers' theological portraits of Jesus (christologies) make it difficult to determine exactly what the man Jesus said and did?
What level of safety stock should be maintained : The purchasing manager for a firm is trying to determine what the safety stock should be for a particular product. She has developed the following table, which gives the distribution of demand during the lead-time and the probabilities.The carryin..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Decrypt cipher-text by using secret key

Decrypt the cipher-text c = 12 by using secret key sk = (p, q) = (11, 13), where te corresponding public key is pk = (N, e) = (143, 13).

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd