Cryptography Discussion Find Attached PPT As Referenc 534372 ✓ Solved
Subjectcryptographydiscussionfind Attached Ppt As Referenceafter Rea
Subjectcryptographydiscussionfind Attached Ppt As Referenceafter Rea
SUBJECT : Cryptography DISCUSSION Find attached PPT as reference. After reading chapter 13, analyze the advantages and disadvantages of digital signatures. Make sure to cover 300 words and 2 references. Stallings_8e_Accessibl e_fullppt_13.pdf Cryptography and Network Security: Principles and Practice Eighth Edition Chapter 13 Digital Signatures Figure 13.1 Simplified Depiction of Essential Elements of Digital Signature Process Digital Signature Properties • It must verify the author and the date and time of the signature • It must authenticate the contents at the time of the signature • It must be verifiable by third parties to resolve disputes Attacks • Key-only attack – C only knows A’s public key • Known message attack – C is given access to a set of messages and their signatures • Generic chosen message attack – C chooses a list of messages before attempting to break A’s signature scheme, independent of A’s public key; C then obtains from A valid signatures for the chosen messages • Directed chosen message attack – Similar to the generic attack, except that the list of messages to be signed is chosen after C knows A’s public key but before any signatures are seen • Adaptive chosen message attack – C may request from A signatures of messages that depend on previously obtained message-signature pairs Forgeries • Total break – C determines A’s private key • Universal forgery – C finds an efficient signing algorithm that provides an equivalent way of constructing signatures on arbitrary messages • Selective forgery – C forges a signature for a particular message chosen by C • Existential forgery – C forges a signature for at least one message; C has no control over the message Digital Signature Requirements • The signature must be a bit pattern that depends on the message being signed • The signature must use some information unique to the sender to prevent both forgery and denial • It must be relatively easy to produce the digital signature • It must be relatively easy to recognize and verify the digital signature • It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message • It must be practical to retain a copy of the digital signature in storage Direct Digital Signature • Refers to a digital signature scheme that involves only the communicating parties – It is assumed that the destination knows the public key of the source • Confidentiality can be provided by encrypting the entire message plus signature with a shared secret key – It is important to perform the signature function first and then an outer confidentiality function – In case of dispute some third party must view the message and its signature • The validity of the scheme depends on the security of the sender’s private key – If a sender later wishes to deny sending a particular message, the sender can claim that the private key was lost or stolen and that someone else forged his or her signature – One way to thwart or at least weaken this ploy is to require every signed message to include a timestamp and to require prompt reporting of compromised keys to a central authority ElGamal Digital Signature • Scheme involves the use of the private key for encryption and the public key for decryption • Global elements are a prime number q and a, which is a primitive root of q • Use private key for encryption (signing) • Uses public key for decryption (verification) • Each user generates their key – Chooses a secret key (number): 1
Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials. Subject Name: Information Governance Discussion: Mobile Computing We learn from our readings that the use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.
From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them. Make sure to cover 300 words and 2 references Subject Name: Information Governance Discussion: Cloud Computing According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.
The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. Identify the issues and risks that pose concern to organizations storing data in the cloud - briefly support your discussion.