Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 1. Let p be an odd prime. (6 points) (a) What are the possible values of x mod p so that x is

imageimageimageimage

Problem 1. Let p be an odd prime. (6 points) (a) What are the possible values of x mod p so that x is its own inverse modulo p? (b) Consider the product 1.2.... (p 1) = (p 1)! (mod p). Show that (p 1)!= -1 (mod p) (c) Determine 65! mod 67. Problem 2. Suppose p is prime and a is a primitive root modulo p. (6 points) (a) Determine the index of integer -1. (b) Using the properties of discrete logarithms solve the following congruence: 8k5= 3 (mod 17) Problem 3. Indicate false (F) or true (T). (13 points) (a) IPSec encompasses three functional areas of authentication, confidentiality and privacy. (b) Transport mode provides protection to the entire IP packet. (c) IPSec is optional in IPv6. (d) Firewalls can hide the internal destination port numbers and IP addresses. (e) SHA-1 produces a hash value of 128 bits. (f) The PPTP, L2F, GRE, and L2TP are tunneling protocols. (g) An X.509v3 certificate is not an IETF standard. (h) IPSec is a transport-level security protocol. (i) When 3372 is divided by 37 the remainder is 9. (1) The integer value n - n is not necessarily divisible by 8 for every positive integer n. (k) An IPSec implementation may not need a database of Security Associations to be used. (1) The Digital Signature Standard (DSS) uses the digital signature algorithm (DSA). (m) The result of the addition operation (x + x + x) (x + x + 1) is 2x5 + 2x + x + 1. (n) -5 = 21 (mod 16). (o) A "zero polynomials" has no terms and has no solution. (p) IPSec uses IKE protocol to implement data confidentiality. (q) Deffie-Hellman scheme is mostly used for signing digital contracts. (r) A digital signature requires hashing and asymmetric encryption. (s) Using RSA, if an opponent can factor n into its two prime factors, enables him to figure out the private key. (t) Angie is the network administrator for a small e-commerce business. Her organization uses a dual firewall topology. She should install a Web server on the intranet segment that contains information that should be accessible to external users. (u) The multiplicative inverse of 59 mod 17 is 23. (v) A main application of digital signature is in signing the certificates issued by a CA. (w) 2n-1 + 32n-1 is divisible by 2 and 3 for every natural number n. (x) Alice and Bob can create a session key between themselves using their public-key schemes. (y) The AH protocol does whatever ESP does with additional functionality. (z) AES is a symmetrical encryption algorithm. Problem 4. A typical network environment scenario is illustrated in the following diagram. (5 points) (a) Describe the functions of the gateway device in the figure. (b) How are the two given IP addresses related together? (c) What are the drawbacks of this configuration, if any? Internet Untrusted Network IP address: 135.3.2.1 Gateway Trusted Network IP address: 10.3.2.1

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

A First Course In Abstract Algebra

Authors: John Fraleigh

7th Edition

0201763907, 978-0201763904

More Books

Students also viewed these Computer Network questions

Question

discuss how to detect and prevent substance abuse,

Answered: 1 week ago

Question

discuss the problem of compulsive sports gambling.

Answered: 1 week ago

Question

Describe Raedekes entrapment theory of sport burnout.

Answered: 1 week ago