Question: Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices it uses. Uses public key authentication (RSA) for
Uses public key authentication (RSA) for initial authentication. Only export-grade authentication, so not strong initial authentication.
The same for digital signatures.
For symmetric key encryption, uses RC4 with 40-bit keys. Weak key length.
Uses MD5 for HMACs. MD-5 is a vulnerable algorithm.
(a) For the second-to-last row of Figure 3-9, comment on the strengths of its symmetric encryption cipher and of its hashing algorithm.
(b) Describe the entries in the last row of Figure 3-9. Comment on the strengths of the choices it uses.
Step by Step Solution
3.38 Rating (173 Votes )
There are 3 Steps involved in it
a For symmetric key encryption uses 3DES Strong but very slow Uses ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
883-C-S-S-A-D (2829).docx
120 KBs Word File
