Question: I need 1st & 2nd 1. Explain CAS Architecture by drawing diagram. (15 points) 2. Design a simple cryptography steps that uses two series of
I need 1st & 2nd
1. Explain CAS Architecture by drawing diagram. (15 points) 2. Design a simple cryptography steps that uses two series of same encryption algorithm for any six-letter texts. How do you do decryption? Explain. (15 points) 3. What are the differences between OpenStack and Microsoft Azure cloud platforms? Provide 3 differences and explain them by justifying your answer. (15 points) 4. What are the 5 main components (modules) of the OpenStack Cloud Infrastructure? Explain. (15 points) 5. Based on Asymmetric-key cryptography of the RSA Algorithm, Abdullah generates his RSA keys by selecting two prime numbers: p = 7 and q = 11. Afterwards, Abdullah computes the modulus for encryption and decryption: n = p X q =77, and =60. According to this, Abdullah chooses 13 for e and calculated d to be 37. (Total 20 points) Based on the above, answer the following two questions: a. What are the constructed private key and the public key of the above problem? (8 points) b. Assuming Jaafar knows e and n and he wants to send a message = 2 to Abdullah. Explain how Jaafar encrypts the message and what key Jaafar is using and how the message is decrypted by Abdullah, and what key Abdullah is using? Explain send/receive message by using figures (12 points) 6. What is Cloud Taxonomy? Explain. (10 points) 7. What are the differences between asymmetric-key and symmetric-key cryptography? Explain. (10 points) 1. Explain CAS Architecture by drawing diagram. (15 points) 2. Design a simple cryptography steps that uses two series of same encryption algorithm for any six-letter texts. How do you do decryption? Explain. (15 points) 3. What are the differences between OpenStack and Microsoft Azure cloud platforms? Provide 3 differences and explain them by justifying your answer. (15 points) 4. What are the 5 main components (modules) of the OpenStack Cloud Infrastructure? Explain. (15 points) 5. Based on Asymmetric-key cryptography of the RSA Algorithm, Abdullah generates his RSA keys by selecting two prime numbers: p = 7 and q = 11. Afterwards, Abdullah computes the modulus for encryption and decryption: n = p X q =77, and =60. According to this, Abdullah chooses 13 for e and calculated d to be 37. (Total 20 points) Based on the above, answer the following two questions: a. What are the constructed private key and the public key of the above problem? (8 points) b. Assuming Jaafar knows e and n and he wants to send a message = 2 to Abdullah. Explain how Jaafar encrypts the message and what key Jaafar is using and how the message is decrypted by Abdullah, and what key Abdullah is using? Explain send/receive message by using figures (12 points) 6. What is Cloud Taxonomy? Explain. (10 points) 7. What are the differences between asymmetric-key and symmetric-key cryptography? Explain. (10 points)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
