What is the important benefit of asymmetrical encryption

Assignment Help Theory of Computation
Reference no: EM131918676

1. What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption
a. It speeds up the encryption process.
b. It makes e-mail easier to encode.
c. Only the sender knows to whom the information is going.
d. Messages can be transmitted openly and only the receiver can decrypt the information

2. Which part of CAIN is realized through the use of message digest functions and hashes?
a. confidentiality
b. authenticity
c. integrity
d. non-repudiation

3. What defines the strength of a cryptographic method?
a. number of shifts
b. need for a code book
c. complexity of the algorithm
d. length of time needed to crack it

4. Cryptography is related to mathematics because _______.
a. the functions of mathematics have cryptographic properties
b. logarithms can cause convergence of numbers
c. mathematics is simple and easy to use
d. information can be represented as numbers and manipulated mathematically

5. To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a. his/her public key
b. the receiver's public key
c. his/her private key
d. the receiver's private key

6. One should establish access control policies for each part of the information system that is ______________.
a. a high traffic area
b. a high security area
c. a high maintenance area
d. accessible to the public

7. If you are attempting to gain access to restricted information, what is the first thing you should do?
a. kidnap an employee
b. ask for what purpose
c. spoof the server
d. disable the alarm system

8. Justify your answer. [50-100 words]
It is necessary to keep cryptographic algorithms private. True or False

9. Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). What CAIN property is that? Your colleague tells you: "Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E's in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E's, that message is from an imposter." [a,b,c: 2 points, d: 4 points]
a) This number, put at the end of each message, is an example of what cryptographic item?
b) Does it have the characteristic of being one way i.e can you deduce the original message?
c) Is it collision resistant?

Can you suggest some other way to indicate that message is from the sender without encryption?

Verified Expert

In this assignment we have studied about cryptography.Here we have learned How to public key are communicate securely through network .Here we have also studied about how to pass communicate securely by cryptography.Here we have learned about how to do symmetric and asymmetric algorithm.

Reference no: EM131918676

Questions Cloud

Discuss the explanation of the apparent color : Discuss the explanation of the apparent color of an object based on the color of the light illuminating it.
Understanding of science and its processes : Discuss your understanding of science and its processes as compared to the opinion of most (that science is a body of knowledge to be memorized).
What are the components of cost-volume-profit analysis : What are the components of cost-volume-profit (CVP) analysis? How does a CVP income statement help management make decisions?
Reflected in cash budget of firm that is in zero tax bracket : Which of the following is NOT directly reflected in the cash budget of a firm that is in the zero tax bracket?
What is the important benefit of asymmetrical encryption : What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption - Which part of CAIN is realized through
How much power does she generate if she is moving : She reaches the top of the stairs in 5.00 seconds. How much power does she generate if she is moving at 2.76 m/s at the top of the stairs?
Describe the process of globalization and the challenges : Describe the process of globalization and challenges and opportunities it presents to business. Provide an example of a challenge and an example of opportunity.
Calculate the maximum height above the roof : Calculate the maximum height above the roof reached by the rock, the magnitude of the velocity of the rock just before it strikes the ground
Briefly summarize the holding in miranda v arizona : Create your own fact pattern to illustrate how and when law enforcement agents must give the Miranda warnings.

Reviews

Write a Review

Theory of Computation Questions & Answers

  If l recognized by dfa then language left half is regular

We showed to prove that if L can be identified by DFA then the language left half(L) = {x ∈ ∑*|∃y xy ∈ L and |x| = |y|} is also regular; here |x| means length of x.

  Find cfgs for the languages

Find CFGs for the languages over the alphabet sigma = {a   b}:

  1 the subset-sum problem is defined as follows given a set

1. the subset-sum problem is defined as follows given a set b of n positive integers and an integer k can you find a

  Design a machine selling three types of drinks

Design a machine selling three types of drinks dl, d2, d3 and two types of stacks sl, s2. The buyers can use three types of coins cl, c2, c3.

  Explain the concept of minimizing finite-state automata

Explain the concept of minimizing finite-state automata. Give an algorithm that carries out this minimization.

  Satisfy the properties - reflexive and symmetric

For the relations below, explain why the relation does or does not satisfy each of the properties reflexive,symmetric, antisymmetric, and transitive.

  Construct the SLR parsing table for grammar

Construct the SLR parsing table for grammar. This will require you to compute the Follow sets for the nonterminals E, T, and F, as well as the item sets.

  Microwave water heating system

Tankless microwave water heating systems have been introduced that not only quickly provide hot water but also significantly reduce the exergy destruction inherent in domestic water heating with conventional electrical and gas-fueled water heaters..

  Rice-s theorem for enumerable or non-re

We know by rice's theorem that none of the following problems are decidable. However,are they recursively enumerable,or non-RE? IS L(M) infinite?

  Design a dfa to recognize language l

Design a DFA to recognize L and write a program that implements your DFA - you should check the ASCII code of each character of the string and process on the DFA accordingly.

  Modify the heuristics for the 1 bp problem

Modify the heuristics for the 1-BP problem for the case where each bin j, j = 1,...,n, has a capacity qj and a cost fj.

  Prove by telescoping that tn cnlgn cn under the given

prove by telescoping that tn cnlgn cn under the following conditiontn c if n 1tn 2tn2 cn if n gt

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd