Question

An organization has 100 members. It is desired that each member of the organization be able...

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. How many unique keys are required if:
a. The organization uses a symmetric cipher.
b. The organization uses an asymmetric cipher.

Homework Answers

Answer #1

SOLUTION-

a. For the symmetric cipher every pair of person must have their key . So in total no. of keys in symmetric cipher=

No. of pairs of people in the organisation.

= NC2

Here no. of people is N= 100

So no. of keys required = 100C2

= 100! / (2!(100−2)!)

= 4950

b. In assymetric cipher every person must have their own private key and public key.

So organisation needs 2 keys per person to make communication secure.

So, in assymetric cipher ,

No. of keys = 2* no. of people in orgnisation

= 2 * N

= 2* 100

= 200.


IF YOU HAVE ANY DOUBT PLEASE COMMENT DOWN BELOW I WILL SOLVE IT FOR YOU:)
----------------PLEASE RATE THE ANSWER-----------THANK YOU!!!!!!!!----------

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
There are five members (Sara, Anna, Adam, Mohammed and Maryam) in a family. Each of them...
There are five members (Sara, Anna, Adam, Mohammed and Maryam) in a family. Each of them has some amount of money that would like to invest in different projects and each member can invest up to 3000 $. Family members are able to borrow or lend money among themselves at an interest rate.                                                                                                                                                                                       The rates of return on the family’s members investment project are given in the below table: Family Members Amount Rate of Return Sara 2500       $ 7% Anna...
Respond as appropriate. Each response must be a least 100 words in length. You have been...
Respond as appropriate. Each response must be a least 100 words in length. You have been appointed as the team leader of a new project in your company. After a few weeks in the position, you start to notice there are distinct positive and negative members on your team. A few of your team members have been listed below along with a description of their group behavior. Identify which positive or negative member role they are displaying and explain how...
“PhysicalFun” is a physical center which opens 24 hours per day. Each member of “PhysicalFun” has...
“PhysicalFun” is a physical center which opens 24 hours per day. Each member of “PhysicalFun” has an access card. Members would be charged in a weekly basic (Sunday 12:00a.m. to Saturday 11: 59 p.m.) according to the accumulated number of hours of facilities used within a week. The weekly basic charge is $150 with an additional charge of $30 per hour. According to the company record, the number of hours a member spends in “PhysicalFun” in a week is normally...
“PhysicalFun” is a physical center which opens 24 hours per day. Each member of “PhysicalFun” has...
“PhysicalFun” is a physical center which opens 24 hours per day. Each member of “PhysicalFun” has an access card. Members would be charged in a weekly basic (Sunday 12:00a.m. to Saturday 11: 59 p.m.) according to the accumulated number of hours of facilities used within a week. The weekly basic charge is $150 with an additional charge of $30 per hour. According to the company record, the number of hours a member spends in “PhysicalFun” in a week is normally...
Lists are members of a general category of abstract data types (ADTs) called containers (i.e., objects...
Lists are members of a general category of abstract data types (ADTs) called containers (i.e., objects whose purpose is to hold other objects). A list is a collection of items having the following defining characteristics: Homogeneity: All the items are of the same type. Linearity: Each item has a unique predecessor (except the first) and a unique successor (except the last). Variable Length: The number of items can vary over time. Order: Items may be ordered (i.e., as in a...
Mary Kate is a project manager in the IT department for a university. She has been...
Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create a faculty intranet. The university has multiple campuses in various locations, and professors and other faculty need to be able to easily post questions, schedules and other documents to share in a secure environment. Mary Kate performed the following steps to begin the intranet project. She performed a needs analysis. Mary Kate interviewed the university faculty to...
The project has been performing as planned, and the team members have been exhibiting increasing levels...
The project has been performing as planned, and the team members have been exhibiting increasing levels of trust between each other. The sponsor and the buyer have been satisfied with the delivery of business value, and user acceptance testing results are positive. A technical expert consulting with the team has expressed concerns that the team is not in agreement on the best way to deliver to the next review. If the project manager wants to support the team in reaching...
passage require analysis and breakdown Our organization has decision-making opportunities heavily affected by the political/governmental climate....
passage require analysis and breakdown Our organization has decision-making opportunities heavily affected by the political/governmental climate. As a healthcare-partnering OPM, our organization partners with private universities and healthcare institutions in order to address the nursing shortage in our country. However, both education and healthcare are highly regulated fields (and with good reason!). These intense regulations are of constant concern and increase risk considerably in many areas of the organization. The greatest concern and risk deal with the initial partnerships forged...
Mary Kate is a project manager in the IT department for a university. She has been...
Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create a faculty intranet. The university has multiple campuses in various locations, and professors and other faculty need to be able to easily post questions, schedules and other documents to share in a secure environment. Mary Kate performed the following steps to begin the intranet project. She performed a needs analysis. Mary Kate interviewed the university faculty to...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT