This preview shows page 1. Sign up to view the full content.
Unformatted text preview: are not possible. 4. Use the Beej's Guide to Network Programming (mentioned in class) to explain how the shutdown command works for clients to terminate a connection. How does it differ from close? Illustrate the difference based on a scenario. 5. Suppose N people want to communicate with each of N -1 other people using symmetric key encryption. All communication between any two people, i and j, is visible to all other people in this group of N, and no other person in this group should be able to decode their communication. How many keys are required in the system as a whole? Now suppose that public key encryption is used. How many keys are required in this case? 6. Using the RSA public key encryption algorithm discussed in class, choose p = 3 and q = 11 to encrypt the word hello. Apply the decryption algorithm to recover the original plaintext message....
View Full Document
This note was uploaded on 02/14/2012 for the course CSCE 313 taught by Professor Gu during the Spring '11 term at Texas A&M.
- Spring '11