Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Automata & Computation Expert

1. What is the most important benefit of asymmetrical encryption? Compare and Contrast with symmetrical encryption
a. It speeds up the encryption process.
b. It makes e-mail easier to encode.
c. Only the sender knows to whom the information is going.
d. Messages can be transmitted openly and only the receiver can decrypt the information

2. Which part of CAIN is realized through the use of message digest functions and hashes?
a. confidentiality
b. authenticity
c. integrity
d. non-repudiation

3. What defines the strength of a cryptographic method?
a. number of shifts
b. need for a code book
c. complexity of the algorithm
d. length of time needed to crack it

4. Cryptography is related to mathematics because _______.
a. the functions of mathematics have cryptographic properties
b. logarithms can cause convergence of numbers
c. mathematics is simple and easy to use
d. information can be represented as numbers and manipulated mathematically

5. To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a. his/her public key
b. the receiver's public key
c. his/her private key
d. the receiver's private key

6. One should establish access control policies for each part of the information system that is ______________.
a. a high traffic area
b. a high security area
c. a high maintenance area
d. accessible to the public

7. If you are attempting to gain access to restricted information, what is the first thing you should do?
a. kidnap an employee
b. ask for what purpose
c. spoof the server
d. disable the alarm system

8. Justify your answer. [50-100 words]
It is necessary to keep cryptographic algorithms private. True or False

9. Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). What CAIN property is that? Your colleague tells you: "Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E's in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E's, that message is from an imposter." [a,b,c: 2 points, d: 4 points]
a) This number, put at the end of each message, is an example of what cryptographic item?
b) Does it have the characteristic of being one way i.e can you deduce the original message?
c) Is it collision resistant?

Can you suggest some other way to indicate that message is from the sender without encryption?

Automata & Computation, Computer Science

  • Category:- Automata & Computation
  • Reference No.:- M92757339
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Automata & Computation

Models of computation assignment -purpose - to improve and

Models of Computation Assignment - Purpose - To improve and consolidate your understanding of regular and context-free languages, finite-state and pushdown automata. To develop skills in analysis and formal reasoning abo ...

Solve the question given belowprove the following statement

Solve the question given below Prove the following statement using Hall's Theorem. For any bipartite graph G=(U, V, E), if every node (either a left node or a right node) has exactly d neighbors, where d is an arbitrary ...

Prove or disprove the following proposed inference rules

Prove or disprove the following proposed inference rules for functional dependencies. A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules. A disproof ...

Regular expressions automatacomputabilitytheory of

Regular expressions, automata/computability/theory of computation How would I go about interpreting regular expressions? For example, how would I interpret the following in English: (0+1)*011 0*1*2* 0^(+)1^(+)2^(+)

Models of computation assignment -purpose - to improve and

Models of Computation Assignment - Purpose - To improve and consolidate your understanding of regular and context-free languages, finite-state and pushdown automata. To develop skills in analysis and formal reasoning abo ...

Iot and data analytics1 analyse the taskanalyse what is

IOT and data analytics 1. Analyse the Task Analyse what is expected of you. This includes careful reading of the assignment task as specified in the Subject Outline. The executive summary of the research project is to be ...

Question 1hoare logic semantics for each of the parts below

Question 1 Hoare Logic Semantics For each of the parts below, justify your answer briefly. 1. For which programs S does {False} S {True} hold? 2. For which programs S does {True} S {False} hold? 3. For which programs S d ...

Question 1a digital computer has a memory unit with 16 bits

Question 1: A digital computer has a memory unit with 16 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for on ...

Question - design a state machine that will control a

Question - Design a state machine that will control a vending machine. The vending machine has 4 inputs, N, D indicating a nickel or dime was inserted as well as clk and an active high asynchronous reset. The vending mac ...

Prove or disprove the following proposed inference rules

Prove or disprove the following proposed inference rules for functional dependencies. A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules. A disproof ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As