Homework 8
Answer the following questions about Kurose and Ross, Chapters 8 and 9.
You only need to turn in those that have a point count assigned.
-
What is the weakness of using passwords as an authentication mechanism,
even when they are encrypted?
Describe how you get a more secure authentication?
-
(1 points)
What is the primary difference between symmetric key and
public key encryption systems?
-
Why is symmetric key encryption is often used for encrypting a network
connection?
-
(1 points)
What are the two parts of a RSA encryption key?
How are they used to encrypt a message?
-
(1 points)
Alice wants to send a secret message to Bob using public key encryption.
Whose key does she use?
Which key?
-
(1 points)
Alice wants to digitally sign a document that she is sending to Bob
using public key encryption.
Whose key does she use?
Which key?
-
What is a certification authority?
What purpose does it serve?
-
(1 points)
Briefly describe the two major types of firewalls.
-
In a network management protocol what is the relationship between
managed devices and agents?
-
What is ASN.1?
-
What is a managing information base?