What is relationship between hashing and digital signatures

Assignment Help JAVA Programming
Reference no: EM13316127

Task 1.Online Discussions

Below are listed a set of topics. You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

  • Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
  • Raise questions about the information provided by other students (this must be done in an adequately professional manner)
  • Respond to questions raised about your own information and other student's
  • Contribute to discussions in general

Note that the aim of this task is:

  • To build an understanding and perspective of current hot topics in Network Security; and
  • To build generic skills including, but not limited to
    • A capacity for teamwork and collaboration
    • An ability for critical thinking, analysis and problem solving
    • Gaining or improvinginformation technological literacy
    • A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.

Topic Set 

1.      The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)

2.      The future of internet anonymity services, such as Tor, given the recent revelations of NSA hacking on a global scale

3.      Encrypting more and more internet services with SSL (HTTPS) by default

4.      The security risks around BYOD (Bring Your Own Device) in the workplace

5.      The security risks around using Cloud Computing

6.      The security risks to critical infrastructure (such as power, communication, water) from malicious cyber attacks

7.      Offering financial rewards for finding security vulnerabilities in software

Your submission

You are required to prepare and submit a report on your topic to address the following questions:

1.      Summarize the topic and the issues discussed. Discuss how your own posts contributed to this knowledge.

2.      Based on your own research, discuss whether or not the summary presented in (1) is accurate.

3.      Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Explain why you view this issue/these issues as important.

4.      Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Task 2: Security Infrastructure and Protocols

a)      PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust. 

b)      The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base .

Task 3: Security Primitives

a)      Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

b)      What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c)      Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.


Attachment:- Assignment.docx

Reference no: EM13316127

Questions Cloud

Determine the tensions in the cables and the reactions : The suspended load exerts a force F = 600 lb at A and bar OA weighs 200 lb. Assume that the bar's weight acts at its midpoint. Determine the tensions in the cables and the reactions at the ball and socket support O.
Evaluate the characteristics of an effective entrepreneur : The Entrepreneur is usually regarded in business as a person of many valuable characteristics. Critically evaluate the characteristics of an effective entrepreneur giving relevant examples where possible.
Scenarios demonstrates the concept of free-riding : A school fundraiser raffles off a free trip to Hawaii. Many people purchase raffle tickets, but there is only one winner.
What wil be the linear speed of the free end at this instant : A uniform rod of mass m and length l is kept vertical with the lower end clamped. What wil be the linear speed of the free end at this instant
What is relationship between hashing and digital signatures : The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)
The advantages and disadvantages of livingg in a centrally : Explore The Advantages and disadvantages of livingg in a Centrally Planned Economy and the impacts they have on the citizens that live there.
What does the golf ballweigh : A croquet ball weight 460 g.Together a golf ball and a croquet ballweigh the same as eleven golf balls.What does the golf ballweigh?
Develop a marketing plan for a small coffee shop : Develop a marketing plan for a small and independent coffee shop that she wishes to open in Peterborough and proposed coffee shop and the tactical marketing plan should be in line with this target. You might also include Porter's generic strategy.
We can examine the effects of a subsidy with a simple supply : We can examine the effects of a subsidy with a simple supply and demand model. Suppose the graph below shows the market for kerosene in Indonesia. The line labeled S1 represents

Reviews

Write a Review

JAVA Programming Questions & Answers

  Develop a queue class

Print-out of the text file that contains your restaurant information and develop a Queue class. Hint: Check out the sample Queue java source files included with this assignment. Declare a class Party to hold one party.

  Implement a class person with two fields name and age

Implement a class Person with two fields name and age, and a class Car with three fields

  Prison sentence for armed burglary

Compose a letter to an employer explaining why you should be hired even though you have just completed a 5 year prison sentence for armed burglary. Specify the type of company you are applying for.

  Write a class that reads a file

In java, write a class that reads a file and outputs a list of the unique words in the file and the number of times each unique word occurs.Hint: use a HashMap with keys being the words and values being integer counts associated with the words.

  Write a java application to ask number of assignments

Write a java application that accomplishes the following tasks with built in exception handling: ask the number of homework assignment students have submitted in a semester

  Communication with an smtp server

Develop a graphical user interface based java program that can communicate with a real SMTP email server for sending emails

  String as its parameter and returns the length

Write a method named longestWord that accepts a String as its parameter and returns the length of the longest word in the string.A word is a sequence of one or more non-space characters (any character other than the space character).

  Determine the visual resolution of resulting image

Drawing in 8.5 by 11 inch sheet is digitized by means of 300 dpi (dots per inch) scanner. Determine the visual resolution of resulting image (number of dots in each dimension)?

  Write the method called print triangle type.

Write the method called printTriangleType. This method accepts three integer arguments representing the lengths of the sides of a triangle and prints the type of triangle that these sides form. Here are some sample calls to printTriangleType

  Design a single class that expresses the commonality

Design a single class that expresses the commonality of these concepts.

  Implementation of memory management

Implementation of memory management

  Create bean jsp program which will compute simple interest

Create the bean which will compute Simple Interest. Use bean in JSP program. Accept details of saving like principal amount, rate of interest, period-in years from user and show amount

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd