Alice and Bob are two data scientists from different parts of the world. To track terrorist operations, they're working on sensitive government data collections. They
Alice and Bob are two data scientists from different parts of the world. To track terrorist operations, they're working on sensitive government data collections. They don't want to communicate their data sets and analysis findings via existing chat programs or email services. They want to use a secure communication platform to distribute their content instead of existing options.
Task: Propose a framework for them to accomplish their goal, based on your expertise in encryption and decryption methods.
i. Explain to them how to construct a secure infrastructure using a diagram. Cryptographic algorithms and network access control techniques should be taken into consideration.
ii. Discuss the challenges that would be encountered in the key exchange process. Suggest methods to overcome challenges in such environments by employing a Certificate Authority(CA)
Step by Step Solution
3.45 Rating (155 Votes )
There are 3 Steps involved in it
Step: 1
Question Task 1 Secure framework suggestion Data Encryption Standard DES Data must be encrypted before sending to the receiver end There are many techniques available like DES This technique encrypts ...See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started