Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

This is the third time I am asking for the same question and no response, please

ID: 3582921 • Letter: T

Question

This is the third time I am asking for the same question and no response, please solve it.

An Airport is planning an enterprise-wide wireless network for employees and airline staff only. This network will be connected to the airport’s existing wired network. You are given the task of designing this network with the highest degree of security possible:
a. Illustrate and Describe your design indicating all authentication and encryption algorithms used.
b. Describe how the user device discover and associate with the network’s access point.
c. Describe how a user is authenticated in your design.
d. Describe how the keys between the user device and the access point are agreed upon.
e. Describe how each transmission key is determined.

Explanation / Answer

a) There are total 2 entities in the system one is staff and other is employees. Also enities of wired network include in the system. We can login system(username, password and OTP) code for authentication of user.

1st we need to provide a form on which a user can register and get a username password and OTP code.

for Encryption we can use RSA.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

b)User device can detect the system by using a wire less By using WIfi AND can be detected by the notification of avaliblity of the system.

c)user authenticated by using by using user name passworrd OTO code if user provide wrong details about the account they will get message about waring and if user provide right details.

when user submit details it will check by the server and match with database.

d) there must be an agreement between the user and system. RSA is considered an asymmetric algorithm due to its use of a pair of keys. You’ve got your public key, which is what we use to encrypt our message, and a private key to decrypt it.

e)

The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based on the difficulty of factoring large integers.

Party A can send an encrypted message to party B without any prior exchange of secret keys. A just uses B's public key to encrypt the message and B decrypts it using the private key, which only he knows. RSA can also be used to sign a message, so A can sign a message using their private key and B can verify it using A's public key.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote