Question: Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices it uses. Uses public key authentication (RSA) for

Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices it uses.
Uses public key authentication (RSA) for initial authentication. Only export-grade authentication, so not strong initial authentication.
The same for digital signatures.
For symmetric key encryption, uses RC4 with 40-bit keys. Weak key length.
Uses MD5 for HMACs. MD-5 is a vulnerable algorithm.
(a) For the second-to-last row of Figure 3-9, comment on the strengths of its symmetric encryption cipher and of its hashing algorithm.
(b) Describe the entries in the last row of Figure 3-9. Comment on the strengths of the choices it uses.

Step by Step Solution

3.38 Rating (173 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a For symmetric key encryption uses 3DES Strong but very slow Uses ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

883-C-S-S-A-D (2829).docx

120 KBs Word File

Students Have Also Explored These Related Systems Analysis And Design Questions!