Question

In: Computer Science

4NCA: 4.1 List ways in which secret keys can be distributed to two communicating parties. 4.2...

4NCA:

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.

  • 4.2 What is the difference between a session key and a master key?

  • 4.3 What is a key distribution center?

  • 4.4 What entities constitute a full-service Kerberos environment?

  • 4.5 In the context of Kerberos, what is a realm?

  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?

Solutions

Expert Solution

  1. List ways in which secret keys can be distributed to two communicating parties.

      Ways in which secret keys can be distributed to two communicating parties

  • Key selected by A and physically delivered to B.
  • Third party selects the key and physically delivered it to A and B.
  • If A and B have recently used a key, one party could transmit the new key to the other, using the old key to encrypt the new key.
  • If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.
  1. What is the difference between a session key and a master key?

Temporary encryption key used between two principals. Is called a session key.

A long-lasting key that is used between a key distribution center and a principal for the purpose of encoding the transmission of session keys is called a master key. Master keys are distributed by non-cryptographic means.

  1. What is a key distribution center?

A system that is authorized to transmit temporary session keys to principals is called a key distribution center. Each session key is transmitted in encrypted form, using a master key that the key distribution center shares with the target principal.

  1. What entities constitute a full-service Kerberos environment?
  • Number of application servers
  • Kerberos server
  • Number of clients
  1. In the context of Kerberos, what is a realm?

The realm is an environment in which

  • The Kerberos server must have the user ID and hashed password of all participating users in its database. All users are registered with the Kerberos server.
  • The Kerberos server must share a secret key with each server. All servers are registered with the Kerberos server.
  1. What are the principal differences between version 4 and version 5 of Kerberos?

V4 has some environmental shortcomings and some technical deficiencies. V5 overcomes these deficiencies and shortcomings.


Related Solutions

I:Answer the following questions.(1*4=4pts) 1.List ways in which secret keys can be distributed to two communicating...
I:Answer the following questions.(1*4=4pts) 1.List ways in which secret keys can be distributed to two communicating parties. 2.List two approaches to message authentication. 3.What is the difference between a private key and a secret key? 4.List and briefly define three applications of a public-key cryptosystem. 5.Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
1.Who are the four parties to a life insurance contract? 2.What are two ways in which...
1.Who are the four parties to a life insurance contract? 2.What are two ways in which a will can be revoked?
Describe two ways in which psychological factors can contribute to depression. Describe two ways in which...
Describe two ways in which psychological factors can contribute to depression. Describe two ways in which biological influences can lead to depression. describe three different treatment options for depression. Name the characteristics of each of the three types of bipolar disorder. What is a key treatment for bipolar disorder?
List two ways can test the existence and completeness of insurance policies.
List two ways can test the existence and completeness of insurance policies.
Question 4 4.1. Explain each of the ways data can be inputted into a programming environment....
Question 4 4.1. Explain each of the ways data can be inputted into a programming environment. (10) 4.2. Discuss each step in the requirements analysis phase of programming. (20)
List four ways in which a microorganism can be resistant to an antimicrobial agent and explain...
List four ways in which a microorganism can be resistant to an antimicrobial agent and explain why they can or can’t be transferred to other microorganisms.
Briefly list the four main ways in which a household’s consumption smoothing can be limited. Then...
Briefly list the four main ways in which a household’s consumption smoothing can be limited. Then expand thoroughly on what you know about these restrictions to consumption smoothing. Use graphs whenever necessary.
1. List and explain the three ways in which there can be market failure. 2. Define...
1. List and explain the three ways in which there can be market failure. 2. Define externality and distinguish between positive and negative externality and their impact on production, using examples where possible. 3. How can a government correct for positive and negative externalities ?
List two ways you can increase the linear velocity of a point on a rotating body....
List two ways you can increase the linear velocity of a point on a rotating body. Which factors can you control? Which one would have the biggest impact? Why?
13. (4 pts.) List and describe two of the four ways that a company’s management can...
13. (4 pts.) List and describe two of the four ways that a company’s management can demonstrate that safe and healthy work practices are a required part of every employee’s job. 15. (4 pts.) True or False: No one person can expect to be an expert in the wide range of workplace safety and health issues. Explain your answer. I was having trouble finding clear answers in my text book
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT