What is the most important benefit of asymmetrical


1. What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption
a. It speeds up the encryption process.
b. It makes e-mail easier to encode.
c. Only the sender knows to whom the information is going.
d. Messages can be transmitted openly and only the receiver can decrypt the information

2. Which part of CAIN is realized through the use of message digest functions and hashes?
a. confidentiality
b. authenticity
c. integrity
d. non-repudiation

3. What defines the strength of a cryptographic method?
a. number of shifts
b. need for a code book
c. complexity of the algorithm
d. length of time needed to crack it

4. Cryptography is related to mathematics because _______.
a. the functions of mathematics have cryptographic properties
b. logarithms can cause convergence of numbers
c. mathematics is simple and easy to use
d. information can be represented as numbers and manipulated mathematically

5. To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a. his/her public key
b. the receiver's public key
c. his/her private key
d. the receiver's private key

6. One should establish access control policies for each part of the information system that is ______________.
a. a high traffic area
b. a high security area
c. a high maintenance area
d. accessible to the public

7. If you are attempting to gain access to restricted information, what is the first thing you should do?
a. kidnap an employee
b. ask for what purpose
c. spoof the server
d. disable the alarm system

8. Justify your answer. [50-100 words]
It is necessary to keep cryptographic algorithms private. True or False

9. Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). What CAIN property is that? Your colleague tells you: "Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E's in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E's, that message is from an imposter." [a,b,c: 2 points, d: 4 points]
a) This number, put at the end of each message, is an example of what cryptographic item?
b) Does it have the characteristic of being one way i.e can you deduce the original message?
c) Is it collision resistant?

Can you suggest some other way to indicate that message is from the sender without encryption?

Solution Preview :

Prepared by a verified Expert
Theory of Computation: What is the most important benefit of asymmetrical
Reference No:- TGS02714155

Now Priced at $30 (50% Discount)

Recommended (93%)

Rated (4.5/5)