Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Show all work in detail : 1) [ Fill out your answers {a function name and a number} directly in the text ]: In the

Show all work in detail :

1) [Fill out your answers {a function name and a number} directly in the text]: In the Number Theory, two integers, n and m, are said to be relatively prime (or co-primes) when their ____(n, m) {a function} = _____{a number}.

2) [Message Authentication Codes] Bob sends a message to Alice. He sends the message in plaintext, but first he uses a Message Authentication Code (MAC), with a secret key he shares with Alice, to create a cryptographic checksum for the message. He sends the cryptographic checksum along with the message. Upon receipt of the message, Alice uses the same MAC algorithm and key to generate a cryptographic checksum. She compares the two checksums and finds them to be identical. As a result, what two things is Alice assured of about the message? _______________ What is she not assured of? ______________________

3) What is the essential difference between a worm and a virus? Your Answer: _________________

4) [Fill out your answers directly in the text]: Sometimes, web pages contain tiny images, too small to be visible to the user. Such an image is called a ___________, and its purpose is to convey information to a web server operated by a company that ___________ your navigation through the web.

5) [TRUE or FALSE] The following are examples of a secret key (symmetric) block cipher {put TRUE or FALSE}:

The Advanced Encryption Standard ___________

The Caesar Cipher ___________

Blowfish ___________

RSA ___________

The Playfair Cipher ___________

IDEA ___________

MD5 ___________

The Data Encryption Standard ___________

6) [Authentication] Which of the following are good choices for a secure password? {put GOOD or BAD}

Gomamgo ___________

4seasons ___________

unitedairline ___________

JohnSmith ___________

The5%Queen^! ___________

admin ___________

asix36riversize ___________

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

7. How do you develop a common ground with your audience? (LO 11-5)

Answered: 1 week ago

Question

Persuasive Speaking Organizing Patterns in Persuasive Speaking?

Answered: 1 week ago