Ask Electrical & Electronics Expert

Question 1: Consider the enhanced protocol of Kerberos. This protocol introduces an additional structure using Ticket Granting Server (TGS) to perform identity verification in addition to Authentication server.

(a) Discuss the advantages of the new structure as compared with the simple protocol. Explain how the TGS helps in the process.

(b) The enhanced protocol uses two tickets, Ticket1 and Ticket2. Explain the functions of the two Tickets. Explain how encryption and decryption are carried out on the two Tickets.

(c) There are still some shortcomings in the enhanced protocol, for example, there is still a need for the user to authenticate the servers. Propose how this can be implemented.

Question 2: SSH can be used to secure and protect both Internet and Web traffic through port forwarding techniques such as Local Forwarding and Remote Forwarding. Consider a scenario where you wish to access your company's SharePoint/File Server, located at office, from your home laptop. The Server is located behind the company's firewall and will not accept any incoming connection request from your home computer.

(a) Which port forwarding technique will you use to access your work server from home?

(b) Explain briefly, the steps taken to accomplish this scenario.

(c) In the SSH Transport layer protocol, the Server host key is used during key exchange to authenticate the identity of the host. What are the trust models for a client to have prior knowledge of the server's public host key? State the advantages or disadvantages of each trust model.

Question 3:

(a) The key management phase of the IEEE802.11i RSN involves the generation of cryptographic keys for the use of AP and the STA. By applying the IEEE802.1X standard, show how these keys are generated.

(b) Briefly describe the five IEEE 802.11i phases of operation

Question 4: Alice sends to Bob a signed and encrypted PGP email message.

(a) Explain the process to sign and encrypt the message.(8 marks)

(b) Illustrate the detailed format of the transmitted PGP message with a description of its comprising components. Also, show clearly the parts of the message that are encrypted, compressed and encoded.

Question 5: In IPSEC, ESP provides confidentiality, data origin authentication, connectionless integrity, anti-replay service and limited traffic flow confidentiality.

(a) Explain traffic flow confidentiality and what it protects against.

(b) Explain how the anti-replay service is implemented in IPSEC

(c) In IPSEC, why is there a need to combine security associations? Examine the basic approaches to combine security associations into bundles? Illustrate your answers with the aid of diagrams.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M91309329
  • Price:- $100

Guranteed 48 Hours Delivery, In Price:- $100

Have any Question?


Related Questions in Electrical & Electronics

Question 1for the ce amplifier in figure 1 given the

Question 1 For the CE amplifier in Figure (1), given the following component parameters: Parameter Value β DC , β AC 150 V BE 0 . 7 V V CC 12 V R C 820 ? R E 1 100 ? R E 2 220 ? R 1 20 k? R 2 5 . 2 k? R L 100 k? C 1 , C ...

Question -i a star-connected three-phase synchronous

Question - (i) A star-connected, three-phase synchronous induction motor takes a current of 10 amps from a 415 volt supply at unity power factor when supplying a steady load. If the synchronous reactance is 5 ohms/phase ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

Question 1 in the voltage regulator circuit in figure p221

Question 1: In the voltage regulator circuit in Figure P2.21, V 1 = 20 V, V Z = 10 V, R i = 222Ω and P z (max) = 400 mW. (a) Determine I L, I z , and I L , if R L = 380Ω. (b) Determine the value of R L , that will establ ...

Summative assessmentin 2017 sej101 assessment will consist

Summative Assessment In 2017 SEJ101 assessment will consist of nine tasks that will develop a portfolio of your assessed work. Throughout the trimester you will have the opportunity for feedback on all nine tasks before ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

1 a name the three major groups of contamination and

1. (a) Name the three major groups of contamination and briefly describe their physical characteristics. (b) Where do the above contamination types come from? Give one example of each. 2. Name two processes metrics which ...

Case studythis assignment consists of a written report of

CASE STUDY This assignment consists of a written report of approximately 1000 words and any diagrams in which you are asked to critically compare different process methods used to achieve the same result and show an awar ...

Problem 1 a two-phase servomotor has rated voltage applied

Problem 1: A two-phase servomotor has rated voltage applied to its excitation winding. The torque speed characteristic of the motor with Vc = 220 V, 60 Hz applied to its control phase winding is shown in Fig.1. The momen ...

Electrical engineering questions -q1 two ideal voltage

Electrical Engineering Questions - Q1. Two ideal voltage sources designated as machines 1 and 2 are connected, as shown in the figure below. Given E 1 = 65∠0 o V, E 2 = 65∠30 o V, Z = 3Ω. Determine if Machine 1 is genera ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As