Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

PROBLEM 3 - Cryptography Fundamentals (20 points) (5 pts each) a) Which of the f

ID: 3596374 • Letter: P

Question

PROBLEM 3 - Cryptography Fundamentals (20 points) (5 pts each)

a) Which of the following would provide the strongest encryption?

A) Random one-time pad

B) DES with a 56-bit key

C) AES with a 256-bit key

D) RSA with a 1024-bit key

b) Which of the following should be the first step when a new Certificate Signing Request (CSR) has to be submitted to a Certificate Authority (CA)?

A) Generate a new private key based on AES.

B) Generate a new private key based on RSA.

C) Generate a new public key based on AES.

D) Generate a new public key based on RSA.

c) Ann wants to send a secure encrypted email to Joe, and wants to ensure that Joe can verify that she sent it. Which of the following does Joe need to verify the certificate that Ann used in this process is valid?

A) Ann’s public key

B) Ann’s private key

C) Joe's private key

D) Joe's public key

E) The CA’s private key

F) The CA’s public key

d) When a user needs to provide message authenticity, in the absence of a secure channel, what options may be the best?

A) Send a digital signature of the message to the recipient

B) Encrypt the message with a symmetric algorithm and send it

C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient

D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

Explanation / Answer

As the algorithm itself is good and larget key means harder to decrypt it.

Generate a new public key based on AES.

To transmit a message the sender has to encrypt the message with the public key. Also AES is government undertaken to need to generate certificate.

C. Ann’s private key

Ann’s private key will help joe decrypt the message.

D. Create a checksum, append it to the message, encrypt the message, then send it to the recipient.

Checksum makes sure that the data received is in correct shape or parts of the data has been lost during transmission. Also encryption makes sure the message is unreadable.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote