Question: 1 . We discussed how cryptographic techniques can be used to communicate while preserving the principles of confidentiality , integrity , authentication , and non
We discussed how cryptographic techniques can be used to communicate while preserving the principles ofconfidentialityintegrityauthentication andnonrepudiation.
Suppose Alice and Bob want to communicate securely while Eve the eavesdropper wants to steal andor sabotage Alice and Bob's communications. For each of the four principles listed above, describe a way that Alice and Bob can thwart Eve's plans ie how can Alice and Bob use cryptographic techniques for confidentiality, integrity, authentication, and nonrepudiation Explain clearly how the techniques preserves the claimed principle.If you propose a technique that address multiple principles, explain clearly what part of the technique addresses which principle.
One of the conditions of using hashing for digital signatures is that we must avoid collisions both weak and strong Explain why it is important to avoid collisions. Provide an example of a way an attacker could exploit a hash collision. Refer to which of the principles of confidentiality, integrity, authentication, and nonrepudiation could be compromised.
Note:
You should be able to answer both of these questions based solely on the materials we discussed in class.If you rely on an external source, you must cite it
Responses should depend oncritical thinkingandinclude an explanation of your reasoning.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
