Ask Computer Network & Security Expert

1. Public-Key Encryption is based on a reverse-ECC, written on one-time pads, with limited entropy, and extended ASCII, powered by AES, using Double and Triple DES signatures. This prime modularity is conditioned by the "Weakest link" principle, that insures non-conflicting quantum bits, and is based on fully transposed bits commensurate with non-repudiating ciphertext intervals. 

The above statement is: 
a. a logical result from the discovery of Rivest, Shamir and Adelman, the RSA team. 
b. True for only rare occasions 
c. True for decryption, not for encryption 
d. Utter nonsense 


2. A message that was encrypted with DES, cannot be re-encrypted with RSA because DES is a symmetric cipher, and RSA is asymmetric. AES is symmetric like DES, but its key size is larger and therefore it too cannot be used for re-encryption. 

Which of the responses below fits? 
a. true, re-encryption can only be done with the same cipher that performed the original encryption. 
b. to encrypt a message is to turn it upside down, if you do it twice you get it back up again, so re-encryption makes no sense any which way. 
c. True but useless. The opposite makes sense: you can re-encrypt with DES a message that was pre-encrypted with RSA! 
d. False. One can re-encrypt any data regardless of its source, and even re-encrypt once more! 


3. If you add two bits to a cryptographic key, you make it four times more difficult to guess it correctly. 

The above statement is: 

a. false: cryptographic keys are built from bytes, not bits. 
b. true only if the key has 4 bits before adding the extra two. 
c. false. adding two bits is making very little difference in how difficult it is to guess a typical large key. 
d. correct, because every bit can have one of two values. 

4. A Hollywood studio, having heard you just graduated from cryptography class asks your professional opinion regarding the following plot: the bad guy sells his victim a public version of RSA along with an encryption key, then he prevails on his victim to encrypt with it all his personal data and erase the plain version. Later he extorts the victim, demanding a fortune to receive his decryption key, otherwise he would lose access to his own data. The studio wonders if the script makes any technical sense. 

Which of the following answers to the studio will make your professor proud? 
a. the script preparer does not know what he is talking about. 
b. from a crypto point of view this script is OK. 
c. makes no sense. The victim could readily acquire the RSA public key and readily decrypt his personal data. 
d. As written it's not scientific, but if the preparer would use Diffie Hellman, it will be OK. 

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M987146

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As