Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 1 10 points The US military designates systems as belonging to assuranc

ID: 3891655 • Letter: Q

Question

QUESTION 1 10 points The US military designates systems as belonging to assurance categories MAC 1 or MAC 2 or MAC 3. If a system belongs to _blank category, it will automatically be assured for the other two categories. Your reply should have one of the following: MAC 1 MAC 2 MAC 3 QUESTION 2 10 points The key schedule results in generating multiple keys from the one secret key. These multiple keys are used in multiple sessions of communications one after the other. For example,if someone has 12 keys, they can use it for twelve video calls one after the other such that one of them is picked up at random at a time. some as private keys, some as public keys. for different rounds of encryption for the same plaintext to strengthen the cipher. QUESTION 3 10 points Mars, RC8, serpent and Twofish are cryptopgarphic algorithms required as part of AES standard. that were competitors of Rijndael for AES. that are written for cryptocurrencies such as bitcoin. that were part of AES before Rijndael. Click Save and Submit to save and submit. Click Save All Answers to save all answers Save All Answers Sav

Explanation / Answer

Answer 1:

MAC 1

Explanation:

MAC I Systems handling information that is determined to be vital to the operational readiness or mission effectiveness of deployed and contingency forces in terms of both content and timeliness. while

MAC II Systems handling information that is important to the support of deployed and contingency forces.

MAC III Systems handling information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term.

Thus we can say that If a system belongs to MAC 1 category, it will automatically be assured for the other two categories.

Answer 2:

for different round of encryptions for the same plaintext to strengthen the cipher.

Explanation:

Key Schedule algorithm generates the various keys from a master key where each key is used in the de-ciphering the text in iteration of rounds.

Answer 3:

that were competitors of Rijndael for AES.

Explanation:

In August 2000, NIST selected five algorithms: Mars, RC6, Rijndael, Serpent and Two fish as the final competitors. These algorithms were subject to further analysis prior to the selection of the best algorithm for the AES. Finally, on October 2, 2000, NIST announced that the Rijndael algorithm was the winner.

Please give thumbsup, if you like it. Thanks.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote