Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices

Question:

Describe the entries in the second row of Figure 3-9. Comment on the strengths of the choices it uses.
Uses public key authentication (RSA) for initial authentication. Only export-grade authentication, so not strong initial authentication.
The same for digital signatures.
For symmetric key encryption, uses RC4 with 40-bit keys. Weak key length.
Uses MD5 for HMACs. MD-5 is a vulnerable algorithm.
(a) For the second-to-last row of Figure 3-9, comment on the strengths of its symmetric encryption cipher and of its hashing algorithm.
(b) Describe the entries in the last row of Figure 3-9. Comment on the strengths of the choices it uses.
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Corporate Computer Security

ISBN: 978-0133545197

4th edition

Authors: Randy Boyle, Raymond Panko

Question Posted: