Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.What are the two most important factors in determining the strength of a cryptographic key ? ( Note: The question asks about the key ,

1.What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.)

2.Name the three things related to security that the McCumber Model is intended to cause us to think about. (Hint: What do the three faces of that cube represent?)

3.Name and briefly describe the three properties of a secure information system. These are

attributes of information that together describe a secure system. (Hint: three-letter initialism.)

4.What is social engineering?

5.A one-time pad cryptosystem has a provable property that no other cryptosystem has. What is it?

6.Distinguish between computationally secure and absolutely secure encrypted messages.

7. Name one way of defeating or mitigating traffic analysis.

8. Describe what must happen with respect to public keys for a man-in-the-middle attack to succeed when messages are encrypted using public key cryptography.

9.Of symmetric key cryptography and public key cryptography, which is less computationally intensive?

10. Distinguish between mandatory access control and discretionary access control.

11.Name the three goals of information security. (This is not the same as the three properties of a secure system.)

12. What is the difference between identification and authentication?

13.What are the three factors that can be used in authentication? (Just name them.)

14.A cryptographic hash algorithm is a one-way function; information processed with such a hash algorithm cannot later be recovered. Name one use for a cryptographic hash and briefly explain how the hash is used in your example. (There are several uses; I only want one of them.)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions