Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PLS NO PLAGIARISM 1. Guidance on key lengths changes over time. (a) Name two reputable sources for key length recommendations (other than the ECRYPT recommendations

PLS NO PLAGIARISM

1. Guidance on key lengths changes over time.

(a) Name two reputable sources for key length recommendations (other than the ECRYPT recommendations of Table 10.1) and explain why they are credible sources.

(b) Towhatextentdotheirrecommendationsforsymmetrickeylengthsmatch the recommendations shown in Table 10.1?

(c) Given a public-key cryptosystem, explain how experts might determine which key length for this algorithm is equivalent to a symmetric key length of 128 bits.

2. Key backup is an important part of the cryptographic key lifecycle.

(a) Why is it important to back up cryptographic keys?

(b) In what ways might backup of cryptographic keys differ from backup of more general data on a computer system?

(c) As system administrator of a small organisation deploying symmetric cryptography for protection of all traffic on the local intranet, suggest what techniques and procedures you will use for the backup (and subsequent management of backed-up) cryptographic keys.

3. In the past, the idea of mandatory key escrow in order to facilitate access to decryption keys during an authorised government investigation has been proposed. (a) Explain what is meant by mandatory key escrow.

(b) What are the main problems with attempting to support mandatory key escrow within a key management system?

(c) An alternative approach is to provide a legal framework within which targets of an authorised investigation are forced by law to reveal relevant decryption keys. What are the potential advantages and disadvantages of this approach? (d) For the jurisdiction in which you currently reside, find out what (if any) mechanisms exist for supporting an authorised government investigation in the event that the investigators require access to data that has been encrypted.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2015 Porto Portugal September 7 11 2015 Proceedings Part 1 Lnai 9284

Authors: Annalisa Appice ,Pedro Pereira Rodrigues ,Vitor Santos Costa ,Carlos Soares ,Joao Gama ,Alipio Jorge

1st Edition

3319235273, 978-3319235271

More Books

Students also viewed these Databases questions

Question

You are designing a flight scheduler for an airline AlgorithmAir

Answered: 1 week ago

Question

Apply interpersonal-related tactics for effective team play.

Answered: 1 week ago

Question

b. Where did they come from?

Answered: 1 week ago

Question

c. What were the reasons for their move? Did they come voluntarily?

Answered: 1 week ago

Question

5. How do economic situations affect intergroup relations?

Answered: 1 week ago