1. Explain how cryptographic mechanisms can be used to guarantee the following basic security services. i. Confidentiality ii. Authentication iii. Integrity iv. Non-repudiation v. Non-replay 2. Show the result of encrypting M = 4 using the public key (e; n) = (3; 77) in the RSA cryptosystem. 3. Firewalls use access Control Lists (ACL). Explain what is meant by an ACL and typical contents. 4. Explain what is meant by the term “salt” in relation to cryptography. You should discuss how it is used to make it more difficult to crack passwords. 5. Explain what is meant by a digital signature and describe how it is generated. 6. The permission associated with a program called Program1 and a dataset called Data1 are as follows: Program1: 755 Data1: 742 State the permissions given in bits to the owner, the group and the others.
1. Explain how cryptographic
i. Confidentiality
ii. Authentication
iii. Integrity
iv. Non-repudiation
v. Non-replay
2. Show the result of encrypting M = 4 using the public key (e; n) = (3; 77) in the RSA cryptosystem.
3. Firewalls use access Control Lists (ACL). Explain what is meant by an ACL and typical contents.
4. Explain what is meant by the term “salt” in relation to cryptography. You should discuss how it is used to make it more difficult to crack passwords.
5. Explain what is meant by a digital signature and describe how it is generated.
6. The permission associated with a program called Program1 and a dataset called Data1 are as follows:
Program1: 755
Data1: 742
State the permissions given in bits to the owner, the group and the others.
Step by step
Solved in 6 steps with 6 images