Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.What are the two most important factors in determining the strength of a crypt

ID: 3592187 • Letter: 1

Question

1.What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.)

2.Name the three things related to security that the McCumber Model is intended to cause us to think about. (Hint: What do the three faces of that cube represent?)

3.Name and briefly describe the three properties of a secure information system. These are

attributes of information that together describe a secure system. (Hint: three-letter initialism.)

4.What is “social engineering”?

5.A one-time pad cryptosystem has a provable property that no other cryptosystem has. What is it?

6.Distinguish between computationally secure and absolutely secure encrypted messages.

7. Name one way of defeating or mitigating traffic analysis.

8. Describe what must happen with respect to public keys for a “man-in-the-middle attack” to succeed when messages are encrypted using public key cryptography.

9.Of symmetric key cryptography and public key cryptography, which is less computationally intensive?

10. Distinguish between mandatory access control and discretionary access control.

11.Name the three goals of information security. (This is not the same as the three properties of a secure system.)

12. What is the difference between identification and authentication?

13.What are the three “factors” that can be used in authentication? (Just name them.)

14.A cryptographic hash algorithm is a one-way function; information processed with such a hash algorithm cannot later be recovered. Name one use for a cryptographic hash and briefly explain how the hash is used in your example. (There are several uses; I only want one of them.)

15.What would be the effect on public key cryptography if mathematicians discover an easy way of finding the prime factors of large numbers? Explain why.

16. In the Unites States, organizations sometimes use Social Security Number or a part of it as an authenticator. Is this a good or bad idea? Explain your answer.

17.Explain in detail why a public key embedded in a digital certificate is much harder to tamper with than the public key alone? (Hint: This question asks about the certificate, not about trusting a certificate authority.)

18.Distinguish between a vulnerability and an exploit.

19.What is the purpose of a key exchange algorithm? With what type of cryptosystem is such an algorithm needed?

20. Briefly describe how the techniques of public key cryptography can be used to implement a digital signature. Be sure you distinguish correctly the use of public and private keys.

21.Explain why using a computationally intensive (i.e. slow) hash algorithm is important when storing password data.

22.Distinguish between authentication and authorization.

23.What is the principle of least privilege?

24.What is a default deny policy? (This is also called a “closed” policy in places in the textbook.)

25.Explain the difference between symmetric key encryption and asymmetric (public) key encryption.

Explanation / Answer

Answer of question 1:

The Most important factor in determining strength of the key are:

The strength of encryption is related to the difficulty of discovering the key, which in turn depends on both the cipher used and the length of the key.

the difficulty of discovering the key for the RSA cipher most commonly used for public-key encryption depends on the difficulty of factoring large numbers, a well-known mathematical problem.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Chat Now And Get Quote