Suppose a system employs devices that are each capable of


1. What bad things could happen if Alice uses the same keys with multiple PKIs?

2. Suppose a system employs devices that are each capable of storing a list of 50 CRL entries. How can this design decision lead to security problems?

3. Suppose a system uses a PKI with a CRL. A device in that system is asked to verify a certificate but cannot access the CRL database because of a denial-of-service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Suppose a system employs devices that are each capable of
Reference No:- TGS01665301

Expected delivery within 24 Hours