Question

Question 1: Cryptography                                        &

Question 1: Cryptography                                                               

Cryptography, is the process of making and using codes to secure the information. The science of encryption, known as cryptology, encompasses both cryptography and cryptanalysis. Symmetric and asymmetric encryption algorithms are used in encryption and authentication. (Answer should not exceed 8 lines).

  1. Explain the basic principle of cryptography?

  1. Discuss on the difference between symmetric and asymmetric cryptosystems? Elaborate with a scenario or an example. (4 marks, 1 mark for indicating the difference and 2 marks for presenting a scenario)

c) Explain the authentication factor, and the combination of those factors, to achieve appropriate security on information
(Answer should not exceed 6 lines).
(6 marks, 3 marks for indicating the authentication factors, and 3 marks for presenting a scenario/example of using a combination of those factors)

Homework Answers

Answer #1

Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of modern-day cryptography.

The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

An authentication factor is a category of credential used for identity verification. The three most common categories are often described as something you know , something you have and something you are

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
CSC 322 Systems Programming Fall 2019 Lab Assignment L1: Cipher-machine Due: Monday, September 23 1 Goal...
CSC 322 Systems Programming Fall 2019 Lab Assignment L1: Cipher-machine Due: Monday, September 23 1 Goal In the first lab, we will develop a system program (called cipher-machine) which can encrypt or decrypt a code using C language. It must be an errorless program, in which user repeatedly executes pre-defined commands and quits when he or she wants to exit. For C beginners, this project will be a good initiator to learn a new programming language. Students who already know...
Explain the complete HAZOP procedure as followed in the industry. See summary below. Explain all the...
Explain the complete HAZOP procedure as followed in the industry. See summary below. Explain all the main parts of HAZOP study in details given in the Pdf file including: 1. Overview (including definitions and usage) 2. Hazop methodology (including phases like definition, preparation, examination, documentation and follow-up). Give examples also 3. Risk review 4. Risk communication Guidance: Study the procedure carefully and then write the answers in your own words. Hazard & Operability Analysis (HAZOP) 1   Overview: Hazard and Operability...
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following...
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following is a correct statement regarding digital forensics? It is the study of computer technology. It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law. It encompasses network and code analysis, and may be referred to as electronic data discovery. Digital forensic responsibilities should be assigned to a network administrator before an...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version There is a desperate need for theorists and researchers to generate and refine a new breed of learning-focused instructional design theoriesthat help educators and trainers to meet those needs, (i.e., that focus on learning and that foster development of initiative, teamwork, thinking skills, and diversity)....
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant...
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant agency which integrates the supply chain for companies B. A 2 PL or a 3PL, but not a 4PL C. A company supplying transportation and warehousing services D. A logistics service company specialized in suppling VAS (value added services) 2. What characterizes a 4 PL? (1 point) A. They are non-asset based and provides integrated services primarily supplied by asset based providers, for example...
________ client-centered therapy centers on the patient's goals and ways of solving problems. Select one: a....
________ client-centered therapy centers on the patient's goals and ways of solving problems. Select one: a. Rogers' b. Freud's c. Beck d. Ellis Question 2 Not yet answered Points out of 1.00 Flag question Question text A frequently prescribed drug therapy for managing one's depression is ____________. Select one: a. Adderall b. Lithium c. Prozac d. Thorazine Question 3 Not yet answered Points out of 1.00 Flag question Question text A major goal of modern inpatient psychiatric treatment is: Select...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary rivals? How will the acquisition of Reebok by Adidas impact the structure of the athletic shoe industry? Is this likely to be favorable or unfavorable for New Balance? 2- What issues does New Balance management need to address? 3-What recommendations would you make to New Balance Management? What does New Balance need to do to continue to be successful? Should management continue to invest...
In February 2012, the Pepsi Next product was launched into the US market. This case study...
In February 2012, the Pepsi Next product was launched into the US market. This case study provides students with an interesting insight into PepsiCo’s new product process and some of the challenging decisions that they faced along the way. Pepsi Next Case Study Introduction Pepsi Next was launched by PepsiCo into the US market in February 2012, and has since been rolled out to various international markets (for instance, it was launched in Australia in September 2012). The new product...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT