Question

In: Computer Science

Question # 5. a. Pretty Good Privacy (PGP) is broadly used to secure email communication. Explain...

Question # 5.

a. Pretty Good Privacy (PGP) is broadly used to secure email communication. Explain the steps needed prior to exchanging email messages with privacy and authenticity guarantees for a pair of users using PGP.

b. Estimate the time required to crack a 56-bit DES key by a brute-force attack using a 3000 MIPS (million instructions per second) computer, assuming that the inner loop for a brute-force attack program involves around 15 instructions per key value, plus the time to encrypt an 8-byte plaintext. Perform the same calculation fora 128-bit IDEA key.

Extrapolate your calculations to obtain the cracking time fora 300,000 MIPS parallel processor (or an Internet consortium with similar processing power).

Solutions

Expert Solution

A.When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression saves modem transmission time and disk space and, more importantly, strengthens cryptographic security. Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis.

PGP then creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type. This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.

B. More information is required. Please put full question. Thankyou


Related Solutions

Current Event question: The current unemployment numbers look pretty good, but is there more to the...
Current Event question: The current unemployment numbers look pretty good, but is there more to the story? Discuss the issue of income inequality that exists today vs. the 1950s to 1970s. How can a more progressive tax structure address this? Or should we institute a flat tax on income and do away with loop holes?
5. T/F. Secure Shell (SSH) is used as a more secure replacement for legacy remote connection...
5. T/F. Secure Shell (SSH) is used as a more secure replacement for legacy remote connection protocol Telnet and is used through programs such as Putty to remotely administer computers running various operating systems. 6. T/F. In most organizations, the Chief Operating Officer (COO) is the position responsible for all cyber security at a company. 7. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 8. T/F. When establishing...
Describe communication situations in an organizational setting, where you think email should be used and where...
Describe communication situations in an organizational setting, where you think email should be used and where email should not be used as the primary medium of communication. Explain your answer This is Canadian organizational behavior question
1. The Value of Communication Explain substantively the importance of good communication in your personal life...
1. The Value of Communication Explain substantively the importance of good communication in your personal life and in the business world. In your answer provide examples of where good communication has paid off and bad communication has had unfortunate consequences. 2. The Audience Discuss substantively and provide an example of why one must consider their audience when communicating. Are communication skills more important to the successful performance of a supervisor than to the successful performance of a company president? 4....
Chapter 5 question from Global Communication: Explain the relationship between flow of information, global power and...
Chapter 5 question from Global Communication: Explain the relationship between flow of information, global power and media. Provide examples and cite work.
5.  a) Explain how privacy – overall - is addressed in the workplace. b) Identify and discuss...
5.  a) Explain how privacy – overall - is addressed in the workplace. b) Identify and discuss in one paragraph, one emerging trend in the workplace that involves privacy.
Question 1 (5 marks, 1 each) Therapeutic communication includes five levels: interpersonal communication, transpersonal communication, small-group...
Question 1 (5 marks, 1 each) Therapeutic communication includes five levels: interpersonal communication, transpersonal communication, small-group communication, intrapersonal communication and public communication. Define these levels. Question 2 (5 marks, 0.5 each) The HCP might employ different techniques to establish a relationship with the patient. The selection of the technique depends heavily on the purpose of collaboration and the ability of the patient to communicate verbally. Therapeutic communication helps patients to trust and relax, while non-therapeutic communication causes patients to feel...
QUESTION 53 Exhibit 34-5 Country 1 Country 2 Good A Good B Good A Good B...
QUESTION 53 Exhibit 34-5 Country 1 Country 2 Good A Good B Good A Good B 100 0 75 0 80 10 60 30 60 20 45 60 40 30 30 90 20 40 15 120 0 50 0 150 Refer to Exhibit 34-5. The opportunity cost of one unit of good B is __________ for country 1 and __________ for country 2. 20A; 15A 1/20A; 1/15A 10A; 15A 1/2A; 1A 2A; 1/2A
1. Explain how rules are used to facilitate communication. 2. Explain the role of protocols and...
1. Explain how rules are used to facilitate communication. 2. Explain the role of protocols and standards organizations in facilitating interoperability in network communications. 3. Explain how devices on a LAN access resources in a small to medium-sized business network.
explain the “problem of good “analogy ,and how it is used as an argument against the...
explain the “problem of good “analogy ,and how it is used as an argument against the various theodicies.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT