Question

1. What is Blockcahin? 2. What is Peer-to-Peer network? 3. What are the properties of a...

1. What is Blockcahin?

2. What is Peer-to-Peer network?

3. What are the properties of a hash?

4. How the public and private keys work in Public-key Encryption (PKE)?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. In the simplest of terms, a blockchain is a time-stamped series of immutable data recording that is managed by a cluster of computers not owned by any single entity. Each of these data blocks (i.e. blocks) is secured using cryptographic principles (i.e. chain) and linked to each other. There's no central authority in the blockchain network it's the very essence of a democratic system. Because it's a public and permanent ledger, it's available to anyone and everyone to see the details. Therefore, by its very nature, everything that is built on the blockchain is transparent and all involved are responsible for their actions.

2. Stands for "peer to peer." The "peers" are computer systems in a P2P network that are connected via the Internet to each other. Without the need for a central server, files can be exchanged directly between network systems. In other words, on a P2P network, that computer becomes both a file server and a client.

An Internet connection and P2P software are the only requirements for a computer to join a peer-to-peer network. Kazaa, Limewire, BearShare, Morpheus, and Acquisition are popular P2P software programs. Such applications link to a P2P network, such as "Gnutella," which makes it possible for the machine to reach thousands of other network systems.

3. A good hash function has four main characteristics: 1) The hash value is fully determined by the hashed data. 2) All the input data is used by the hash function. 3) The "uniform" hash function distributes the data throughout the entire set of possible hash values. 4) For identical strings, the hash function produces very different hash values.

4. There are two different linked cryptographic keys (basically long random numbers) in the Public and Private key pair. Below is a Public Key example: what its name suggests is the Public Key-Public Key. It is made available to everyone through a server or directory that is open to the public. The Private Key, on the other hand, must remain confidential to its holders. Since the key pair is mathematically related, anything that is encrypted with a Public Key can only be decrypted by its Private Key and vice versa.

Add a comment
Know the answer?
Add Answer to:
1. What is Blockcahin? 2. What is Peer-to-Peer network? 3. What are the properties of a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] ||...

    network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] || E[KS, ZEM || E[PRа, H(M)]]] O None O E[PUB, Ks]||E[KS, Z(M)] O Z[M|| E[PRа, H(M)] Which of the following statement is true for the equation E[H[PI), PRI) in PGP? Public key of the sender is recovered by using hash of the passphrase Private key of the recipient is recovered in public key ring using hash of the passphrase Public key of the recipient is...

  • Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...

    Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...

  • Operating Systems Question 4. A secure boot scheme adds cryptographic checks to each stage of the boot process. This pr...

    Operating Systems Question 4. A secure boot scheme adds cryptographic checks to each stage of the boot process. This process aims to assert the integrity of all software images that are executed, preventing any unauthorized or maliciously modified software from running. The most logical cryptographic protocol to apply is one based on a public-key signature algorithm. n a public-key signature algorithm-based protocol to realize the secure boot scheme. Your answer should Desig evaluate the following public key storing specify the...

  • 1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol...

    1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...

  • 1. In a scenario where Nancy and Matthew are using public key encryption, which keys will...

    1. In a scenario where Nancy and Matthew are using public key encryption, which keys will Matthew have the ability to see in his public keyring (--list-keys)? 2.    If Nancy wishes to send a message to Matthew, which key does she use to encrypt the message? 3.    If Matthew receives an encrypted message from Nancy, which key does he use to read it?   4.    If Matthew wishes to send a message to Nancy, which key does he use to encrypt...

  • PYTHON Task 1 Create a class called Window It has 2 public properties 1 private property...

    PYTHON Task 1 Create a class called Window It has 2 public properties 1 private property 1 constructor that takes 3 arguments pass each argument to the appropriate property Task 2 In a new file import the Window class Instantiate the Window object Output the two public properties Task 3 Alter the Window class in Task 1 Add an accessor and mutator (the ability to access and change) to the private property Task 4 Create a class named Instrument Give...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT