Question

In: Computer Science

Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that...

Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?

Solutions

Expert Solution

A public key infrastructure consists of set of roles, policies or procedures that are needed to create, manage, distribute, use, store, and revoke digital certificates. It can also manage public-key encryption. It helps in the facilitation of the secure electronic transfer of information that is transmited over a range of network activities such as e-commerce, internet banking and confidential email.PKI provides a chain of trust, so that identities on a network can be verified.CRLs are a type of blacklist and are used by various endpoints, including Web browsers, to verify whether a certificate is valid and trustworthy. Digital certificates are used in the encryption process to secure communications, most often by using the TLS/SSL protocol.any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.


Related Solutions

Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial-of-service attack. What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
[Public key revocation procedure] Suppose that a certain authority is running a (publicly accessible) database of...
[Public key revocation procedure] Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let us define the following procedure for revoking a public key from the database. When a user Bob claims that the secret key skB corresponding to his public key pkB was stolen, he sends to the authority the statement “Revoke Bob’s public key pkB” which is signed using skB . Upon receiving such the statement, the authority revokes pkB from the...
As the U.S. grapples with a growing list of transportation infrastructure needs and limited public funds,...
As the U.S. grapples with a growing list of transportation infrastructure needs and limited public funds, more states are looking to public-private partnerships as a means of fixing and replacing aging bridges, tunnels and roads. Should the private sector help rebuild American infrastructure? Is there a downside for taxpayers?​ what would be the engineer's opinion?
a) In a public-key system using RSA, n=77 and its public key is e=23. What is...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation. b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.
outline the key components of public financial management system.
outline the key components of public financial management system.
. Describe (in detail) the Spaulding Classification system and list the 3 device categories.
. Describe (in detail) the Spaulding Classification system and list the 3 device categories.
List and explain the key stages in the process of system construction by composition
List and explain the key stages in the process of system construction by composition
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M. Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq...
List and explain how leadership uses a case study to make key decisions. 350-500 Words Add...
List and explain how leadership uses a case study to make key decisions. 350-500 Words Add APA citation
Suppose you are a director for a system forensics company. Develop a list of ethical guidelines...
Suppose you are a director for a system forensics company. Develop a list of ethical guidelines that you would publish for your employees based on ethical standards from appropriate sources, such as professional associations. Justify why the items in your guidelines are necessary to add to the code.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT