CIS3360: Security In Computing 1

Download this Homework Solution to explore fundamental cybersecurity concepts.

William Ford
Contributor
4.9
52
6 months ago
Preview (2 of 3 Pages)
100%
Purchase to unlock

Page 1

CIS3360: Security In Computing 1 - Page 1 preview image

Loading page ...

CIS3360: Security in ComputingHomework 51.( 15 points) Knowledge-based Question:a.What are the differences between public/symmetric key cryptography? The advantageand disadvantage of each?Symmetric Cryptography involves 2 people using thesame privatekey to encrypt anddecryptinformation.While in Public key cryptography there are 2 different keys that areused, a public key for encryption and a private key for decryption.PublicKey CryptographyAdvantagesThe public key does not have to be secured that is why it is public. Which anyone canuse. It is much more secure than Symmetric Cryptography.DisadvantagesIt is harder to implementand slower than Symmetric cryptography.SymmetricKey CryptographyAdvantagesIt is much easier to implement, andtakes up much less processing power.DisadvantagesIt islesssecure;both parties have to agree on the same private key to use.a.For English alphabet based texts regardless of upper or lower case (i.e., assuming eachletter has only 26 possible value), if the length of the key using Vigenere Cipher is 4, howmany possible encryption keys exist? (hint: we all know that Caesar cipher has 26possible encryption keys)26^4possible encryption keys.b.What is the usage of a cryptographic hash function? Can two documents have the samehash value?The primary useof cryptographichash function is for message integrity.Yes it is possiblefor 2 documents can have the same hash value.2.(10 points) Determine whether a statement is True or False. If a statement is false, you mustexplain why.a.Digital signature of a message m is H(m), where H() represent a cryptographic hashfunction such as MD5 or SHA-1.TRUE.

Page 2

Preview Mode

This document has 3 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all