15.What would be the effect on public key cryptography if mathematicians discove
ID: 3592200 • Letter: 1
Question
15.What would be the effect on public key cryptography if mathematicians discover an easy way of finding the prime factors of large numbers? Explain why.
16. In the Unites States, organizations sometimes use Social Security Number or a part of it as an authenticator. Is this a good or bad idea? Explain your answer.
17.Explain in detail why a public key embedded in a digital certificate is much harder to tamper with than the public key alone? (Hint: This question asks about the certificate, not about trusting a certificate authority.)
18.Distinguish between a vulnerability and an exploit.
19.What is the purpose of a key exchange algorithm? With what type of cryptosystem is such an algorithm needed?
20. Briefly describe how the techniques of public key cryptography can be used to implement a digital signature. Be sure you distinguish correctly the use of public and private keys.
21.Explain why using a computationally intensive (i.e. slow) hash algorithm is important when storing password data.
22.Distinguish between authentication and authorization.
23.What is the principle of least privilege?
24.What is a default deny policy? (This is also called a “closed” policy in places in the textbook.)
25.Explain the difference between symmetric key encryption and asymmetric (public) key encryption.
Explanation / Answer
15 Answer)
Yes there will an impact definitely, because cryptography of mainly based on prime factorization.Basically you have a "public key" consisting of a product of two large primes used to encrypt a message, and a "secret key" consisting of those two primes used to decrypt the message. You can make the public key public, and everyone can use it to encrypt messages to you, but only you know the prime factors and can decrypt the messages. Everyone else would have to factor the number, which takes too long to be practical, given the current state of the art of number theory.
this will uphold till an easy algorith comes into existence,Because nobody knows a fast algorithm to factorize an integer into its prime factors. Yet, it is very easy to check if a set of prime factors multiply to a certain integer.
........................................................
17 Answer )
Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication).
...........................................................
18 Answer)
Vulnerabilty is basically that drawback of a system which allows the hacker or the unauthorised user to bypass the secuirty system and enter into the main system easily without even letting the security team know. It provides a direct window to enter. That section of the system is considered to be very weak in comparison to the others therefore could be easily breached.
Exploit is the actual act of breaching the vulnerabilities by the hackers in order to enter into the main system.
.................................................................
22 Answer)
Authentication is the process of proving authenticity. Something is authentic if it is not false or an imitation. In software, authentication is validating that an entity is who or what it claims to be. That is, authentication is proving that you are you, or that a computer or a particular program is what it claims to be.
Authorization is the process of authorizing. Something is authorized to do X if it has permission or approval to do X. In software, authorization is validating that a user can perform a given action. That is, once a user is authenticated as a particular user, authorization is about what that user can and cannot do
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.