Indicate whether the certificate is valid or not

Assignment Help Computer Network Security
Reference no: EM131024836

Message:

Consider the details of the X.509 certificate shown below.

a. Identify the key elements in this certificate, including the owner's name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

b. State whether this is a CA or end-user certificate, and why.

c. Indicate whether the certificate is valid or not, and why.

d. State whether there are any other obvious problems with the algorithms used in this certificate.

Certificate:

Data: Version: 3 (0x2) Serial Number: 3c:50:33:c2:f8:e7:5c:ca:07:c2:4e:83:f2:e8:0e:4f

Signature Algorithm: md5WithRSAEncryption Issuer: O=VeriSign, Inc., OU=VeriSign Trust Network, CN=VeriSign Class 1 CA

Individual - Persona Not Validated Validity Not Before: Jan 13 00:00:00 2000 GMT Not After : Mar 13 23:59:59 2000

GMT Subject: O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Persona Not Validated, OU=Digital ID Class 1 - Netscape CN=John Doe/Email= Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (512 bit) Modulus (512 bit): 00:98:f2:89:c4:48:e1:3b:2c:c5:d1:48:67:80:53: d8:eb:4d:4f:ac:31:a9:fd:11:68:94:ba:44:d8:48: 46:0d:fc:5c:6d:89:47:3f:9f:d0:c0:6d:3e:9a:8e: ec:82:21:48:9b:b9:78:cf:aa:09:61:92:f6:d1:cf: 45:ca:ea:8f:df Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Certificate Policies: Policy: 2.16.840.1.113733.1.7.1.1 CPS: https://www.verisign.com/CPS X509v3 CRL Distribution Points: URI:https://crl.verisign.com/class1.crl Signature Algorithm: md5WithRSAEncryption 5a:71:77:c2:ce:82:26:02:45:41:a5:11:68:d6:99:f0:4c:ce: 7a:ce:80:44:f4:a3:1a:72:43:e9:dc:e1:1a:9b:ec:64:f7:ff: 21:f2:29:89:d6:61:e5:39:bd:04:e7:e5:3d:7b:14:46:d6:eb: 8e:37:b0:cb:ed:38:35:81:1f:40:57:57:58:a5:c0:64:ef:55: 59:c0:79:75:7a:54:47:6a:37:b2:6c:23:6b:57:4d:62:2f:94: d3:aa:69:9d:3d:64:43:61:a7:a3:e0:b8:09:ac:94:9b:23:38: e8:1b:0f:e5:1b:6e:e2:fa:32:86:f0:c4:0b:ed:89:d9:16:e4: a7:77

Reference no: EM131024836

Questions Cloud

Is evidence that use of rocking chair reduces poi duration : While the researchers hypothesized that the use of a rocking chair could reduce POI duration, it is not unreasonable to hypothesize that the use of a rocking chair could increase POI duration. Based on this possibility, discuss the appropriateness..
Find the dimension of the solution space : Find the dimension of the solution space of the following homogenous system of linear equations
Studio and expects a return on investment : Anticipated annual volume is 1,000 sessions. The company has invested $2,000,000 in the studio and expects a return on investment (ROI) of 16.5%. Budgeted costs for the coming year are as follows.
Evaluate the cost of energy between the two months : The number of equivalent units produced in October and November was 500,000 pounds and 550,000 pounds, respectively. Evaluate the cost of energy between the two months.
Indicate whether the certificate is valid or not : Identify the key elements in certificate, including the owner's name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.
Qualitative and quantitative performance elements : Your task is to analyse the historical (for the last five years) performance of a listed company and present your findings in the form of a report, which will cover both qualitative and quantitative performance elements in a logical cohesive forma..
Whether it is easier to solve a system by substitution : Single women. The percentage of women in the 20-24 age group who have never married went from 55% in 1970 to 73% in 2000 (Census Bureau, www.census.gov). Let 1970 be year 0 and 2000 be year 30.
Can you please show me the solution step by step : Can you please show me the solution step by step and also included the whole calculation ; i need to understand the solution to solve another one on my own ,
Amount of sales returns and write-offs of uncollectible : What was the combined amount of sales returns and write-offs of uncollectible accounts during the year ended March 29, 2013? If required, round your answers to two decimal places. Enter a subtraction as a negative number.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What additional level of internet protection have children

What additional level of internet protection should children have over adults? Provide explanations for the following situations:

  Certification and accreditation for commercial systems

Using Network Security Certification and Accreditation for commercial systems. Do you think a formal process like Certification & Accreditation is appropriate to use for commercial systems in private industry (Why or Why Not)?

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Goals of computer security

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability.

  Security mechanisms needed to protect the dms systems

Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet

  Kerberos authentication protocol

Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication and Explain the PEAP protocol - how does it differ from EAP and what EAP deficiency does it address?

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  What are stateful inspection firewalls

Why are many of the reliable, effective biometric systems perceived as intrusive by users? What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Lab- vulnerability assessment

Lab: Vulnerability Assessment, Probably the most overlooked process in any type of security system is the vulnerability assessment. Vulnerability assessments are incredibly useful (and necessary) tools

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd