Download this Homework Answers covering key security principles in computing.
Emma Taylor
Contributor
4.1
34
6 months ago
Preview (3 of 7 Pages)
100%
Purchase to unlock
Page 1
Loading page ...
CIS3360: Security in ComputingHomework 51.( 15 points) Knowledge-based Question:a.What are the differences between public/symmetric key cryptography? The advantageand disadvantage of each?a.For English alphabet based texts regardless of upper or lower case (i.e., assuming eachletter has only 26 possible value), if the length of the key using Vigenere Cipher is 4, howmany possible encryption keys exist? (hint: we all know that Caesar cipher has 26possible encryption keys)b.What is the usage of a cryptographic hash function? Can two documents have the samehash value?Answer:1. Public vs Symmetric Key Cryptography•Public Key (Asymmetric):oUses two keys: public (shared) andprivate (secret).oAdvantages: Easier key distribution, non-repudiation.oDisadvantages: Slower, more computationally intensive.•Symmetric Key:oUses one keyfor both encryption and decryption.oAdvantages: Faster, simpler.oDisadvantages: Key distribution is harder, not scalable.2. Vigenère Cipher with Key Length 4•There are26^4 = 456,976possible encryption keys.3. Cryptographic Hash Function•Usage: Ensures data integrity, stores passwords securely, creates digital signatures.•Collisions: While rare, two documents can technically have the same hash value (this iscalled a collision).
Page 2
Page 3
Preview Mode
This document has 7 pages. Sign in to access the full document!