Question

Using the APA writing style, write a 2–3 page paper that answers the questions below. Be...

Using the APA writing style, write a 2–3 page paper that answers the questions below. Be prepared to fully support your answers.

Define public-key cryptosystem.

In your own opinion, why do you think it is important to utilize public-key cryptosystem?

How is it different from symmetric key algorithms?

What are the 5 main requirements that a public-key cryptosystem must fulfill to be a secured algorithm?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

1a)

Public key cryptography (PKC) is an encryption method that uses a matched open and private key (or uneven key) calculation for secure information correspondence. A message sender utilizes a beneficiary's open key to scramble a message. To decode the sender's message, just the beneficiary's private key might be utilized.

The two sorts of PKC calculations are RSA, or, in other words named after this present calculation's creators: Rivest, Shamir and Adelman, and Digital Signature Algorithm (DSA). PKC encryption advanced to meet the developing secure correspondence requests of various areas and enterprises, for example, the military.

PKC is otherwise called public key encryption, asymmetric encryption, symmetric cryptography, asymmetric cipher, asymmetric key encryption and Diffie-Hellman encryption.

1b)

This cryptography is important because it is secure, it is utilized as a strategy for guaranteeing the privacy, genuineness and non-repudiability of electronic interchanges and information stockpiling.

In an publickey mark framework, a man can consolidate a message with a private key to make a short computerized mark on the message. Anybody with the relating open key can consolidate a message, a putative advanced mark on it, and the known open key to check whether the mark was legitimate, i.e. made by the proprietor of the comparing private key. Changing the message, notwithstanding supplanting a solitary letter, will make check fall flat. In a safe mark framework, it is computationally infeasible for any individual who does not know the private key to reason it from people in general key or any number of marks, or to locate a substantial mark on any message for which a mark has not up to this point been seen. In this way the validness of a message can be exhibited by the mark, gave the proprietor of the private key keeps the private key secret.[4][5]

Public key calculations are key security fixings in cryptosystems, applications and conventions. They support different Internet benchmarks, for example, Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some open key calculations give key circulation and secrecy.

Symmetric encryption utilizes a solitary key that should be shared among the general population who need to get the message while Asymmetric encryption utilizes a couple of open key and a private key to encode and unscramble messages when imparting.

1c)

Symmetric encryption is an old system while Asymmetric encryption is generally new.

Asymmetric encryption was acquainted with supplement the inherent issue of the need to share the key in symmetrical encryption demonstrate, removing the need to share the key by utilizing a couple of open private keys.

Asymmetric encryption takes moderately additional time than the symmetric encryption.


1d)

1. It is computationally simple for a party B to produce a pair(Public key KUb, Private

key KRb)

2. It is computationally simple for a sender A, knowing the public key and the message

to be encoded , M, to create the relating ciphertext:

C=EKUb(M)

3. It is computationally simple for the reciever B to decipher the subsequent ciphertext

utilizing the private key to recoup the first message :

M=DKRb(C)=DKRb[EKUb(M)]

4. It is computationally infeasible for a rival , knowing people in public key,KUb,to

decide the private key,KRb.

5. It is computationally infeasible for a rival , knowing people in public key,KUb,

what's more, a ciphertext, C, to recoup the first message,M.

6. The encryption and decoding capacities can be connected in either arrange:

M=EKUb[DKRb(M)]=DKUb [EKRb(M)]



Add a comment
Know the answer?
Add Answer to:
Using the APA writing style, write a 2–3 page paper that answers the questions below. Be...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Write a 1-2 page paper, 12 pt font, double-spaced, describing what you think management accountants do...

    Write a 1-2 page paper, 12 pt font, double-spaced, describing what you think management accountants do at work. What are your impressions of a career in this field of accounting? Please DO NOT look anything up online or quote any source. It is important that you put your own thoughts and impressions on paper. There are no right or wrong answers. This is your opinion. Submit the paper here. Please submit it as a Word document.

  • Write a paper (APA format 2-3 pages) addressing the statement below: A strong Assisted Death policy...

    Write a paper (APA format 2-3 pages) addressing the statement below: A strong Assisted Death policy must address all 7 key Safeguards/Guidelines as outlined below . Based on the table, select one safeguard/guideline and fully explain why you think your selection is important. 7 SAFEGUARDS FOR ASSISTED SUICIDE (1) a patient must have a disease that in incurable and associated with severe suffering with no relief, (2) all reasonable measures to provide reasonable comfort have received consideration or trial, (3)...

  • Article Summary I Read the article below and provide feedback by writing a 2 page summary....

    Article Summary I Read the article below and provide feedback by writing a 2 page summary. Please write in essay format (you may include the questions but the response should be in essay format) Must include the following information Title of the article Author(s) of the article Reference list (include the article itself and any other reference material such as another article that is cited in your summary). Use the reference list in the article to get information about another...

  • Page 256 - Writing Prompt: Ethical Framework for Hostile Takeovers In view of Maxxam's takeover of...

    Page 256 - Writing Prompt: Ethical Framework for Hostile Takeovers In view of Maxxam's takeover of Pacific Lumber, do you believe that hostile takeovers are morally wrong, or could they be morally permissible or even desirable in certain circumstances? What do you think is the most important ethical objection to hostile takeovers? Explain your reasoning. Provide no less than 1 full page response to the above questions and answer each question as a separate paragraph. I want to assess your...

  • Assignment 3: Introduction & Environmental Analysis, SWOT, Marketing Objectives (Goals) Marketing 4100 Directions Total Point Value:...

    Assignment 3: Introduction & Environmental Analysis, SWOT, Marketing Objectives (Goals) Marketing 4100 Directions Total Point Value: 75 points Anticipated Time to Complete: 12 hours Type of Assignment: Individual or Team Audience for Assignment: The CMO and your boss, a director-level person who relies on your evidence-supported reports to make the best decisions in a minimum amount of time. Assignment Objective: To write the marketing plan introduction as well as to collect and analyze data about the environment in which the...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Below is the information: It is important to understand the different leadership styles employed by nursing...

    Below is the information: It is important to understand the different leadership styles employed by nursing leaders in healthcare organizations and to understand their significance on nursing practice and patient outcomes, for better or for worse. Objective: Read the articles from Nursing Standard (PDF) and Bradley University (PDF). In -250 words, formulate an opinion on the following: 1. Reflect on an occasion where you experienced ineffective leadership (doesn't have to be in the hospital). What behaviors did they display? What...

  • Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of...

    Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of physician-centered and collaborative communication. How is the caregiver’s role different in each model? How is the patient’s role different? Answer: Physical-centered communication involves the specialists taking control of the conversation. They decide on the topics of discussion and when to end the process. The patient responds to the issues raised by the caregiver and acts accordingly. On the other hand, Collaborative communication involves a...

  • Performance Improvement programs and effective project management require an understanding of the four phases of the...

    Performance Improvement programs and effective project management require an understanding of the four phases of the project life-cycle: initiation, planning, execution/implementation, and closure. It is important to have each phase of the project mapped on a timeline and to be sure the project team has the appropriate members with the right skills to ensure a successful program. Using a case study from the text, students will demonstrate their ability to review and evaluate a performance improvement program by arranging the...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT