Top-Rated Free Essay
Preview

Cryptography

Good Essays
385 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography
Assignment Requirements
Part 1:
Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:
1. SSL certificates type of certificate is used to provide security on Web sites.

2. PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution.

3. Message authentication code provides authentication or proves integrity of a digital message. 4. SHA-1 encryption scheme was broken and was replaced with a third round version of itself.

5. RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems. 6. The entity that issues certificates is a Certificate Authority

7. The document to check to verify whether a certificate has been revoked is Certificate Revocation List.

8. Each bit of length determines the number of keys.

9. Currently, 128 bit certificates are commonly used for web communications.

10. Triple DES provides 112 bits of security, despite using a 168 bit key.

11. Thawte, Verisign, and Comodo are all examples of SSL certificates.

12. Hiding data in images is an example of Steganography

13. Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data

14. A digitally signed email provides authentication.

15. A digitally encrypted e-mail provides privacy /security

Part 2:

Message-Digest algorithm 5 (MD5) that the University uses has significant weaknesses that can be exploited by attacks. Attackers can launch attacks against X.509 digital certificates signed using the MD5 hashing algorithm, to generate additional digital certificates. Vulnerability in the Internet Public Key Infrastructure (PKI) can allow rogue Certification Authority (CA) certificate trusted by all common web browsers. Rogue Certification Authority (CA) certificate, can impersonate websites and other site using HTTPS. MD5 "collision uses this hash function can expose the security infrastructure of the web to realistic threats. Attackers can generate cryptographic tokens to appear as authentic tokens.

Since the University uses a Cisco ASA firewall device which can create and sign digital certificates for users and systems they should use SSL is a cryptographic protocol to create certificates for critical systems in some departments. SSL is a cryptographic protocol used to create a secure, encrypted connection over the Internet by verifying the identity of a server using a digital certificate system.
Currently the system is usable but caveats should it be replaced.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    3) The HTTP and HTTPS protocols are often used to access email using a web browser.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays