(a) When it is started to keep the secrecy using the secret key or the complexity of the mathematical algorithm and working on binary bit sequences, it is considered as science rather than art where the concept was security through obscurity.
(b)
Yes, cryptography is unconditionally useful. Yes helps to transmit confidential data with ultimate security. It helps to maintain confidentiality, authenticity and data integrity. So this is unconditionally useful.
(c)
Kerckhoffs's principle reformulated by Claude Shannon says that there is no need to hide the scheme of cryptography from the enemies. It is formulated with the conception that enemies know the system. Shannon's maxim is accepted by a wide range of cryptographers, which says that it needs to design the system in such a way that it can be fully familiar with the enemies.
(d)
The two fundamental properties that ensure cryptographic security are:
a)Privacy or Confidentiality
b) Authentication
2. (30 points) Regarding "security beyond symmetric key encryption": (a) (2 points) What breakthrough has turned...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...