security primitivesaexplain the different roles


Security Primitives

a) Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa? 

b) What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c) Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.

Request for Solution File

Ask an Expert for Answer!!
Computer Networking: security primitivesaexplain the different roles
Reference No:- TGS0501179

Expected delivery within 24 Hours