Mike Alborn Cryptography_2

Mike Alborn Cryptography_2 - 3 What does public key...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
SEC-280 Cryptography 2 WK4 Assignment James Kirn Page 1 of 1 Name ____Mike Alborn_____________ Date _09/22/11______ 1. What makes symmetric key cryptography undesirable for transmission of data across the Internet? Are there alternatives? Its difficult to get the key needed to the person on the other end of the transmission without it getting intercepted by the person trying to break into the data. Alternatives are asymmetric key encryption which will allow two different keys to be used for the transmission. 2. When two parties communicate securely across a network, they must exchange keys. Is it permissible to exchange private keys? Is it permissible to exchange public keys? It is not permissible to exchange private keys because that key may be intercepted but it is permissible to exchange public keys because those are meant to be in the public.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 3. What does public key cryptography provide that private key cryptography does not? It enables one person to hold on to a key so they are the only one that can decrypt the data and it keeps it safe from the data being decrypted by people without the authorization. 4. What makes a hash different from the ciphertext generated by an algorithm that is used for standard transmission of data? A hash remains the same for data as long as it is not altered in any way. If the hash is different then the data has been altered in one way no matter how small. 5. Suppose that you receive an encrypted message that contains a MIC. How would you know that the data had not been altered in transit? The MIC matches exactly as it did before it was sent. If it does not match that means something has been changed even if it is a small change....
View Full Document

  • Spring '11
  • Unknown
  • Public-key cryptography, Pretty Good Privacy, Symmetric-key algorithm, GNU Privacy Guard, key cryptography, James Kirn

{[ snackBarMessage ]}

Ask a homework question - tutors are online