Problem 1. Let p be an odd prime. (6 points) (a) What are the possible values...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Problem 1. Let p be an odd prime. (6 points) (a) What are the possible values of x mod p so that x is its own inverse modulo p? (b) Consider the product 1.2.... (p 1) = (p 1)! (mod p). Show that (p 1)!= -1 (mod p) (c) Determine 65! mod 67. Problem 2. Suppose p is prime and a is a primitive root modulo p. (6 points) (a) Determine the index of integer -1. (b) Using the properties of discrete logarithms solve the following congruence: 8k5= 3 (mod 17) Problem 3. Indicate false (F) or true (T). (13 points) (a) IPSec encompasses three functional areas of authentication, confidentiality and privacy. (b) Transport mode provides protection to the entire IP packet. (c) IPSec is optional in IPv6. (d) Firewalls can hide the internal destination port numbers and IP addresses. (e) SHA-1 produces a hash value of 128 bits. (f) The PPTP, L2F, GRE, and L2TP are tunneling protocols. (g) An X.509v3 certificate is not an IETF standard. (h) IPSec is a transport-level security protocol. (i) When 3372 is divided by 37 the remainder is 9. (1) The integer value n - n is not necessarily divisible by 8 for every positive integer n. (k) An IPSec implementation may not need a database of Security Associations to be used. (1) The Digital Signature Standard (DSS) uses the digital signature algorithm (DSA). (m) The result of the addition operation (x + x + x) (x + x + 1) is 2x5 + 2x + x + 1. (n) -5 = 21 (mod 16). (o) A "zero polynomials" has no terms and has no solution. (p) IPSec uses IKE protocol to implement data confidentiality. (q) Deffie-Hellman scheme is mostly used for signing digital contracts. (r) A digital signature requires hashing and asymmetric encryption. (s) Using RSA, if an opponent can factor n into its two prime factors, enables him to figure out the private key. (t) Angie is the network administrator for a small e-commerce business. Her organization uses a dual firewall topology. She should install a Web server on the intranet segment that contains information that should be accessible to external users. (u) The multiplicative inverse of 59 mod 17 is 23. (v) A main application of digital signature is in signing the certificates issued by a CA. (w) 2n-1 + 32n-1 is divisible by 2 and 3 for every natural number n. (x) Alice and Bob can create a session key between themselves using their public-key schemes. (y) The AH protocol does whatever ESP does with additional functionality. (z) AES is a symmetrical encryption algorithm. Problem 4. A typical network environment scenario is illustrated in the following diagram. (5 points) (a) Describe the functions of the gateway device in the figure. (b) How are the two given IP addresses related together? (c) What are the drawbacks of this configuration, if any? Internet Untrusted Network IP address: 135.3.2.1 Gateway Trusted Network IP address: 10.3.2.1 Problem 1. Let p be an odd prime. (6 points) (a) What are the possible values of x mod p so that x is its own inverse modulo p? (b) Consider the product 1.2.... (p 1) = (p 1)! (mod p). Show that (p 1)!= -1 (mod p) (c) Determine 65! mod 67. Problem 2. Suppose p is prime and a is a primitive root modulo p. (6 points) (a) Determine the index of integer -1. (b) Using the properties of discrete logarithms solve the following congruence: 8k5= 3 (mod 17) Problem 3. Indicate false (F) or true (T). (13 points) (a) IPSec encompasses three functional areas of authentication, confidentiality and privacy. (b) Transport mode provides protection to the entire IP packet. (c) IPSec is optional in IPv6. (d) Firewalls can hide the internal destination port numbers and IP addresses. (e) SHA-1 produces a hash value of 128 bits. (f) The PPTP, L2F, GRE, and L2TP are tunneling protocols. (g) An X.509v3 certificate is not an IETF standard. (h) IPSec is a transport-level security protocol. (i) When 3372 is divided by 37 the remainder is 9. (1) The integer value n - n is not necessarily divisible by 8 for every positive integer n. (k) An IPSec implementation may not need a database of Security Associations to be used. (1) The Digital Signature Standard (DSS) uses the digital signature algorithm (DSA). (m) The result of the addition operation (x + x + x) (x + x + 1) is 2x5 + 2x + x + 1. (n) -5 = 21 (mod 16). (o) A "zero polynomials" has no terms and has no solution. (p) IPSec uses IKE protocol to implement data confidentiality. (q) Deffie-Hellman scheme is mostly used for signing digital contracts. (r) A digital signature requires hashing and asymmetric encryption. (s) Using RSA, if an opponent can factor n into its two prime factors, enables him to figure out the private key. (t) Angie is the network administrator for a small e-commerce business. Her organization uses a dual firewall topology. She should install a Web server on the intranet segment that contains information that should be accessible to external users. (u) The multiplicative inverse of 59 mod 17 is 23. (v) A main application of digital signature is in signing the certificates issued by a CA. (w) 2n-1 + 32n-1 is divisible by 2 and 3 for every natural number n. (x) Alice and Bob can create a session key between themselves using their public-key schemes. (y) The AH protocol does whatever ESP does with additional functionality. (z) AES is a symmetrical encryption algorithm. Problem 4. A typical network environment scenario is illustrated in the following diagram. (5 points) (a) Describe the functions of the gateway device in the figure. (b) How are the two given IP addresses related together? (c) What are the drawbacks of this configuration, if any? Internet Untrusted Network IP address: 135.3.2.1 Gateway Trusted Network IP address: 10.3.2.1
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
Solve the compound linear inequality graphically. Write the solution set in set-builder or interval notation, and approximate endpoints to the nearest tenth whenever appropriate. 1.59.10.5x6.8
-
Harrison-Brown is a book publisher that reissues old titles. The company offers these books with either a standard machine-glued hard cover or a deluxe, hand-embossed, hand-stitched, leather cover....
-
Calculate the molar solubility of silver iodide, AgI, in 2.0 M NH3.
-
Work automation is the practice of replacing human workers with technology (i.e., software programs or robots). Describe the impact that work automation is likely to have on business and society in...
-
Place Company purchased 92% of the common stock of Shaw, Inc. on January 1, 2010, for $400,000. Trial balances at the end of 2010 for the companies were: Inventory balances on December 31, 2010, were...
-
Fastball (FB), a teenager who became a superhero after catching a radioactive baseball, can fly, and she can throw any object as fast as a jet aircraft with no air resistance at all. Right now FB is...
-
What is the current yield of the 7% IBM bond issue ($1000.00 bond) at the following bond prices.Fill out the table below. Current Rate Value of Bond Coupon 6.36% $70.00 6.59% $70.00 7.00% $70.00...
-
What is the age rule for the Child Tax Credit for Tax Year 2022?
-
The scattering and absorption cross-sections of \({ }^{12} \mathrm{C}\) for thermal neutrons are \(5.56 b\) and \(0.0035 b\), respectively. Calculate the transport mean free path of neutrons if the...
-
The following facts relate to Alschuler Corporation. 1. Deferred tax liability, January 1, 2015, 40,000. 2. Deferred tax asset, January 1, 2015, 0. 3. Taxable income for 2015, 115,000. 4. Pretax...
-
financial income of 80,000 for 2015. The following items cause taxable income to be different than pretax financial income. 1. Depreciation on the tax return is greater than depreciation on the...
-
Fuel utilization is defined as amount of initial fissile material required per unit energy (g/MWd). For example, CANDU uses natural uranium with \(0.71 \%\) U-235 and generates 7.0 GWd/t. It implies...
-
Higley Corporation has one temporary difference which will reverse and cause taxable amounts in 2015. In 2014, a new tax act set taxes equal to 45% for 2014, 40% for 2015, and 34% for 2016 and years...
-
Identify each of the following: (a) Two aldoses whose configuration at carbons 3, 4, and 5 matches that of D-fructose. (b) The enantiomer of D-galactose. (c) An epimer of D-galactose that is also an...
-
Baxter, Inc., owns 90 percent of Wisconsin, Inc., and 20 percent of Cleveland Company. Wisconsin, in turn, holds 60 percent of Clevelands outstanding stock. No excess amortization resulted from these...
-
Answer Exercise 4 if colors may be repeated on different faces at will. Data from exercise 4 Wooden cubes of the same size are to be painted a different color on each face to make children's blocks....
-
Let H be a subgroup of a group G and let a, b G. Prove the statement or give a counterexample. If aH = bH, then a 2 H = b 2 H.
-
The polynomial 2x 3 + 3x 2 - 7x - 5 can be factored into linear factors in Z 11 [x ]. Find this factorization.
-
A rotary drum filter has a diameter of $6 \mathrm{ft}$ and a length of $8 \mathrm{ft}$ and rotates at a rate of $30 \mathrm{~s} / \mathrm{cycle}$. The filter operates at a vacuum of $500 \mathrm{~mm}...
-
You must filter $1000 \mathrm{lb}_{\mathrm{m}} / \mathrm{min}$ of an aqueous slurry containing $40 %$ solids by weight using a rotary drum filter with a diameter of $4 \mathrm{~m}$ and a length of $4...
-
A slurry containing $1 \mathrm{lb}_{\mathrm{m}}$ of solids per gallon of water is to be filtered in a plate-and-frame filter having a total filtering area of $60 \mathrm{ft}^{2}$. The slurry is fed...
Study smarter with the SolutionInn App