Which will encrypt each users data in a file

Assignment Help Computer Network Security
Reference no: EM13329015

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the cryptographic consultant for the project, do you think this is a good choice or not? You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

Reference no: EM13329015

Questions Cloud

What equal annual deposits must be made at : What equal annual deposits must be made at t=2,3,4,5,8,9 and in 10 in order to accumulate $40,000 at t=15 if money is worth 10% compounded annually?
What is the purpose of the diffie-hellman algorithm : Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
Explain a buffer solution contains 0.71 mol of boric acid : A buffer solution contains 0.71 mol of boric acid (H3BO3) and 0.53 mol of sodium dihydrogen borate (NaH2BO3) in 4.00 L. The Ka of boric acid (H3BO3) is Ka = 5.8e-10. What is the pH of the buffer after the addition of 0.50 mol of NaOH
What amount should be paid for the bond : Mr.Fritz wishes to purchase a bond having a face value of $1000 and a bond rate of 8% payable annually. The bond has a remaining life of 12 years. In order to earn 10% rate of return on the investment, what amount should be paid for the bond?
Which will encrypt each users data in a file : Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.
What is the minimum number of bonds the firm must sell : The MerryWeather Firm wants to raise $15 million to expand its business. To accomplish this, the firm plans to sell 10-year, $1,000 face value zero-coupon bonds. The bonds will be priced to yield 4 percent
Find out the molar enthalpy of vaporization : At two temperatures, 85 K and 135 K, the vapor pressures of a certain liquid were found to be 540 Torr and 830 Torr, respectively. From this information, determine the molar enthalpy of vaporization
What will happen to the price of corn oil : If the demand of corm increases do to it use as an altenative engery source, what will happen to supply of corn substitute such as soybean? what will happen to the price of corn oil?
What is the implicit interest for first year of bonds life : A zero coupon bond with a face value of $1,000 is issued with an initial price of $440.50. The bond matures in 15 years. What is the implicit interest, in dollars, for the first year of the bond's life

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe malicious things over a computer network

Suppose Ali and Jim are sending packets to each other over a computer network. Suppose Thomas positions himself in the network so he can capture all packets sent by Ali and send whatever he wants to Jim; he can also capture all the packets sent by..

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Difference between perception and reputation

Discuss the difference between perception and reputation and explain how can organizational perception affect IT reputation?

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Analysis of a small publishing company

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Develop paper where you address digital forensics tools

Develop a paper where you address three digital forensics tools in the following categories: availability, pricing, platforms supported, technical strengths and weaknesses, etc

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd