Question

In: Computer Science

This is a three part question. For each part the answer requires identifying an asymmetric encryption...

This is a three part question. For each part the answer requires identifying an asymmetric encryption technique, hashing or both. As part of each question you need to discuss the technique to demonstrate your understanding of how the functionality (confidentiality, authenticity, integrity) is supported. You need to discuss the details of what the sender and receiver do and the key usage if applicable.

What technique is used to exchange messages between two parties ensuring confidentiality? Discuss.

What technique is used to exchange messages between two parties ensuring authenticity? Discuss

c. What technique is used to exchange messages between two parties ensuring integrity? Discuss.

Solutions

Expert Solution

a.

Ensuring confidentiality, a very key component of protecting information confidentiality would be Encryption. Encryption ensures that only the right person who knows the key can read the information. Encryption is very widespread in today’s world while interacting with one another through internet. It is the most effective way to achieve the data security. Secure Socket Layer and Transport Layer Security are the security protocols for communication over internet. Example: Internet Banking.

Other ways to make sure that the data remains confidential is to implement file permissions and access control list to restrict access to sensitive information and design of file permissions and access control lists must be kept as easy as possible for proper maintenance.

c.

Integrity means protecting information so that it cannot be customized by not permitted people. Information is only as valuable as it is perfect. Similar to the data confidentiality, encryption plays a prominent role in preserving data integrity. The data shared with another person within a company or externally to a third party or creating an automatic system report containing sensitive information, these all data should be encrypted to prevent the data or sensitive information of a company to be accessed and changed by the third person. The data stored on file shares allow encryption can prevent the data from being altered by malicious objective or being accessed by individuals who do not have access.

When accessing data integrity and designing security requirements it is necessary to ensure the level of encryption is sufficient to protect the integrity of the data, the more sensitive the data the higher the level of encryption that needs to be enabled.


Related Solutions

1. Answer three parts of the question. Your answer for each part should be no more...
1. Answer three parts of the question. Your answer for each part should be no more than two pages long. (a) Describe how a Collateralized Debt Obligation (CDO) distributes payments to its investors. (b) ‘American call options should never be exercised before the maturity date’. Evaluate this statement, providing proofs where necessary. (c) Explain how you would create a Box spread and show its payoff at maturity. (d) Holding all other factors constant, what effect does a change in the...
Use one sentence to briefly describe the difference between symmetric encryption and asymmetric encryption.
Use one sentence to briefly describe the difference between symmetric encryption and asymmetric encryption.
1. Answer three parts of this question. Your answers for each part should be no more...
1. Answer three parts of this question. Your answers for each part should be no more than two pages long. a. Describe the assumed process for the evolution of the underlying asset price in the Black-Scholes optionpricing model. b. Derive the lower bound for a European put option written on a non-dividend paying stock and explain how you could make a riskless profit if this bound is violated. c. ‘American call options written on non-dividend paying stocks should never be...
Part A - Identifying the Processes of Replication, Gene Expression, and Recombination This activity requires that...
Part A - Identifying the Processes of Replication, Gene Expression, and Recombination This activity requires that you correctly identify the processes of DNA replication, gene expression, and recombination by matching images to brief descriptions of each process. Drag each of the items into the appropriate bin. View Available Hint(s) Reset Help DNA →→ mRNA →→ protein translation transformation transcription conjugation DNA →→ 2 DNA (copying one DNA molecule to make two identical DNA molecules) transduction Replication Gene expression Recombination Submit
Each part of this question covers a key concept. Each requires at most a few sentences...
Each part of this question covers a key concept. Each requires at most a few sentences to answer; some are much shorter. Please be concise. (a) What does the Maxwell-Boltzmann distribution describe for a gas in thermal equi- librium? Suppose a gas in a closed cylinder is kept at constant temperature while being compressed to half its original volume. What effect does this compression have on the pressure that the gas exerts on the walls of the cylinder? What would...
What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.
What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.
Two Part Question A) A company is considering a new three-year expansion project that requires an...
Two Part Question A) A company is considering a new three-year expansion project that requires an initial fixed asset investment of $2.55 million. The fixed asset will be depreciated straight-line to zero over its three-year tax life, after which time it will be worthless. The project is estimated to generate $2,030,000 in annual sales, with costs of $725,000. The tax rate is 35 percent and the required return on the project is 15 percent. What is the project’s NPV? B)...
Answer the questions below and each question has a part to complete required for that question...
Answer the questions below and each question has a part to complete required for that question You have been contracted by the government of your country to provide recommendations on the regulation of the national textile industry. Currently, the textile industry which resembles features of the perfectly competitive market is completely unregulated. Using the concepts covered in the class, please provide your advice to the problems below. One of the biggest social problems in the textile industry is child labour...
PART C features an essay-type question with three subparts and requires to provide a full analysis...
PART C features an essay-type question with three subparts and requires to provide a full analysis of the social cost of the output decision of a profit maximizing monopoly firm, assuming that the firm is the only producer in a market. Thoroughly discuss: 1. The concept of social cost in terms of the output decision of the monopoly firm;
PART C features an essay-type question with three subparts and requires to provide a full analysis...
PART C features an essay-type question with three subparts and requires to provide a full analysis of the social cost of the output decision of a profit maximizing monopoly firm, assuming that the firm is the only producer in a market. Thoroughly discuss: 2. Assuming that the government forces the monopoly firm to lower its price, show how the output of the firm would increase;
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT