Homework Week 4

docx

School

Truman State University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

5

Uploaded by Myhomeworksareuseless

Report
Homework Week 4 Sullivan University Hamza Raja CSC635- Computer Security and Legal Issues Q.1 1. In symmetric encryption, the exchange of keys "out of band" is pivotal due to its critical role in maintaining the confidentiality of communication. Symmetric encryption employs a shared secret key for both encryption and decryption processes. However, distributing this key securely poses a challenge. Transmitting the key through the same communication channel being secured exposes it to interception and undermines the very security it seeks to establish. By exchanging keys "out of band," or through a separate secure channel, the risk of unauthorized access to the key is mitigated. This approach ensures that even if the primary communication channel is compromised, the exchanged key remains inaccessible to malicious actors, preserving the confidentiality of the encrypted data. 2. Public Key Infrastructure (PKI) serves as a safeguard for valuable information assets through a comprehensive framework that employs asymmetric cryptography. PKI employs a pair of distinct yet mathematically linked keys—a public key and a private key. While the public key is openly distributed and used to encrypt data, only the private key, securely held by the intended recipient, can decrypt the encrypted content. PKI offers enhanced data confidentiality and integrity by allowing encrypted information to be accessible solely by authorized entities possessing the corresponding private key.
Moreover, PKI incorporates digital certificates to validate the legitimacy of the public keys, thwarting attempts at masquerading and ensuring the authenticity of communication partners. This intricate interplay of encryption, authentication, and validation underpins the robust protection of sensitive data across digital communication channels. 3. "Digital signature" and "digital certificate" are two distinct components within the realm of digital security. A digital signature is a cryptographic technique that serves as a virtual counterpart to a handwritten signature, signifying the authenticity and integrity of digital content. It is generated using the signer's private key and can be verified using the corresponding public key. On the other hand, a digital certificate, also known as a public key certificate, is a digital document issued by a trusted Certification Authority (CA) that links an individual's identity to their public key. This certificate attests to the legitimacy of the public key holder and is used to establish secure communication channels. In essence, a digital signature vouches for the origin and integrity of specific content, while a digital certificate validates the authenticity of a public key holder. Q.2 1. Netscape's Development of Secure Socket Layer (SSL) Protocol: Netscape's creation of the Secure Socket Layer (SSL) protocol was a pioneering effort to address the security challenges posed by transmitting sensitive information over the open and unsecured landscape of the early Internet. The SSL protocol utilized a combination of public-key and symmetric encryption to establish secure channels for communication.
Public-key encryption, exemplified by the RSA algorithm, played a pivotal role in secure key exchange and authentication. When a client connected to a server using SSL, both parties engaged in a handshake process. During this handshake, the server provided its public key to the client, which the client used to encrypt a pre-master secret. Only the server, with its corresponding private key, could decrypt this message and derive the shared secret. Subsequently, the client and server independently generated a session key based on the shared secret. This session key facilitated symmetric encryption of data during the rest of the session, ensuring confidentiality and integrity. Netscape's SSL protocol revolutionized online security, inspiring the subsequent development of Transport Layer Security (TLS) protocols that continue to be fundamental to secure communication on the internet. 2. Hybrid Encryption System Based on Diffie-Hellman Key Exchange: The Diffie- Hellman Key Exchange method introduced an ingenious way to establish a shared secret key between two parties without the need to transmit the key directly. It operates on the principles of modular arithmetic and discrete logarithms. In this process, both parties generate their own public and private key pairs. The public keys are exchanged openly. Each party then uses its private key and the received public key to compute a shared secret value. This value is identical for both parties and serves as the foundation for the symmetric encryption key. The brilliance lies in the fact that deriving the shared secret from the public keys is computationally infeasible for eavesdroppers due to the complexity of the discrete logarithm problem. This shared secret, once derived, becomes the symmetric key for encrypting subsequent communication. The Diffie- Hellman Key Exchange method, therefore, unites the efficiency of symmetric encryption
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
with the security of public-key cryptography, establishing a hybrid encryption system that underpins secure data transmission across various domains of modern cryptography.
References: IBM. (2023, April 4). Secure Sockets Layer (SSL) Protocol. IBM HTTP Server Documentation. Retrieved from https://www.ibm.com/docs/en/ibm-http-server/9.0.5? topic=communications-secure-sockets-layer-ssl-protocol International Journal of Engineering Research & Technology. "Information Security using Cryptography and Steganography." ( https://doi.org/10.17577/IJERTCONV3IS28029 ) Pedamkar, P. (2023, April 3). Digital Signature vs Digital Certificate. EDUCBA. Retrieved from [ https://www.educba.com/digital-signature-vs-digital-certificate/ ] Techopedia. "What is Hybrid Encryption?" ( https://www.techopedia.com/definition/1779/hybrid-encryption )

Browse Popular Homework Q&A

Q: • The diagram below shows a sequence of DNA (a nucleic acid) that codes for an extremely short…
Q: What is a factory building an example of? * O technology Ohuman capital physical capital an economic…
Q: Aluminum hydroxide is used for the relief of heartburn, sour stomach, and peptic ulcer pain and to…
Q: 3. A possible equation of state for a gas takes the form P.V=R·T·e VRT in which a and R are…
Q: Why did the ancient Greeks dismiss the heliocentric theory? Select the two best answers. They did…
Q: b. Compare the mean of the population to the mean of the sampling distribution of the sample mean.…
Q: A clinical trial was conducted to test the effectiveness of a drug for treating insomnia in older…
Q: A water taxi carries passengers from harbor to another. Assume that weights of passengers are…
Q: (a) Air, n₁ = 1 Input ray, parallel to base α Glass, n₂ = 1.5
Q: Match each inverse trigonometric expression to its angle value. sin (1/²) 90° 45° sin¹ (1) cos-¹ (3)…
Q: Given the probability distribution below, find the missing value,y : x P(X=x) -97 0.041 53 y 87…
Q: 5. The cross-section below shows a series horizontal sedimentary and volcanic rocks. The volcanic…
Q: The equilibrium constant, Kp, for the following reaction is 1.80x10-2 at 698 K. 2HI(g) H₂(g) + I₂(9)…
Q: Which of the following is a steroid hormone? A) Cholesterol B) Testosterone C) LDL D) Bile salt E)…
Q: 9. Name the 3 embryonic tissues that give rise to the male and female external genitalia and specify…
Q: Consider the truss below. Using the force method, determine (a) the force in member AC, (b) forces…
Q: n object is located at a distance of f/2 of a convex lens. Locate and characterize the image formed…
Q: Consider the matrices (1 2; 3 4 ) and (5 6; 7 8) Find the regular matrix product (You can…
Q: X 0 0.5 1 1.5 F(x)
Q: 5. Let f(x) = 4x²-x+2 √√x Find/ (+)+8+) +g 4 and g(x)=6√x- 1 1 2√x x√x
Q: Find an equation of the plane. The plane through the points  (0, 9, 9), (9, 0, 9), and (9, 9, 0)
Q: QUESTION 11 Place the following steps in the when renin-angiotensin-aldosterone system (RAAS) that…