Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.What are the two most important factors in determining the strength of a crypt

ID: 3592203 • Letter: 1

Question

1.What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.)

2.Name the three things related to security that the McCumber Model is intended to cause us to think about. (Hint: What do the three faces of that cube represent?)

3.Name and briefly describe the three properties of a secure information system. These are

attributes of information that together describe a secure system. (Hint: three-letter initialism.)

4.What is “social engineering”?

5.A one-time pad cryptosystem has a provable property that no other cryptosystem has. What is it?

6.Distinguish between computationally secure and absolutely secure encrypted messages.

7. Name one way of defeating or mitigating traffic analysis.

8. Describe what must happen with respect to public keys for a “man-in-the-middle attack” to succeed when messages are encrypted using public key cryptography.

9.Of symmetric key cryptography and public key cryptography, which is less computationally intensive?

10. Distinguish between mandatory access control and discretionary access control.

11.Name the three goals of information security. (This is not the same as the three properties of a secure system.)

12. What is the difference between identification and authentication?

13.What are the three “factors” that can be used in authentication? (Just name them.)

14.A cryptographic hash algorithm is a one-way function; information processed with such a hash algorithm cannot later be recovered. Name one use for a cryptographic hash and briefly explain how the hash is used in your example. (There are several uses; I only want one of them.)

Explanation / Answer

Answer 1) The strength of the key can be determined by :

Answer 4) The act of convincing or manipulating people so that they give away the important information which later can be used by the attacker to breach the secured area is known as social engineering.

Answer 11) The three goals of the information security are :

Answer 11) Identification is the process of identifying a user's identity. It is done at the intial level which does not grant any types of permissions to the users, whereas authentication is process of comparing the inputed credentials with the already stored ones for the purpose of verification. It is done after the identification face and if matches with the stored credentials access is granted to the user.