Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices
Question:
Uses public key authentication (RSA) for initial authentication. Only export-grade authentication, so not strong initial authentication.
The same for digital signatures.
For symmetric key encryption, uses RC4 with 40-bit keys. Weak key length.
Uses MD5 for HMACs. MD-5 is a vulnerable algorithm.
(a) For the second-to-last row of Figure 3-9, comment on the strengths of its symmetric encryption cipher and of its hashing algorithm.
(b) Describe the entries in the last row of Figure 3-9. Comment on the strengths of the choices it uses.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: