ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 29 Apr 2017 My Price 8.00

Cryptography

Describe the purpose of the process outline on slide 9   on the attached document.Please describe it about 100-150 words

 

 

Cryptography
Week 6 © Copyright 2012 – 2013 (ISC)², Inc. All Rights Reserved. For Personal Use of (ISC)2 Seminar Attendee Only.
Contents May Not Be Copied or Otherwise Distributed Under Any Circumstances Message Integrity Controls
(MIC) © Copyright 2012 – 2013 (ISC)², Inc. All Rights Reserved. For Personal Use of (ISC)2 Seminar Attendee Only.
Contents May Not Be Copied or Otherwise Distributed Under Any Circumstances Categories of
Cryptosystems
Organizatio
n of
Cryptosyste
ms Two-Way
Cryptograp
hy Symmetric Stream Steganogra
phy Message
Integrity
Controls Asymmetric Block Factoring
the Product
of Large
Primes Discreet
Logarithms Page 369
©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only. Message Integrity Controls (MIC) • MICs detect
Accidental Change
alterations
(whether
intentional or
accidental) to a
message during
transmission
HMAC
CBC-MAC
• A MIC is a special
Digital
value that is
Signature
calculated based
on the message Intentional Change
contents and
Page 370
added to the ©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only. Hash Function
Characteristics
• Produces a “condensed representation” of
the original message
• Should be a one-way function
• Non-linear relationship between hashes
• Should derive the hash using the whole,
original message Page 371
©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only. Common Hash Functions
• Message Digest 2, 4, 5, 6
• Secure Hash Algorithm (SHA) 1, 2, 3
• HAVAL
• RIPEMD
• Tiger
• WHIRLPOOL Page 372
©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only. Digital Signatures
• What are digital signatures?
Bob Alice
Message Message Message Digital
Signature Digital
Signature Message Hash Hash
E Digest ©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. Alice’s
Private Key D Digest Digest
Verified Page 373 For Personal Use of (ISC)2 Seminar Attendee Only. Uses of Digital
Signatures
• E-commerce
• Non-repudiation of origin
• Integrity of message
• Software distribution
• Trusted time stamp Page 374
©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only. Example of a Complex Hybrid
System
Alice Bob’s Public Key E CT(k) D E D Messag
e H Alice’s
Private Key Diges
t
Diges
t D Bob’s
Public
Key
©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. Bob Bob’s Private Key H Alice’s
Public Key E D Diges
t Diges
t Digital
Signature Messag
e Diges
t
E
Bob’s
Private
Key
For Personal Use of (ISC)
Seminar Attendee Only.
2 This week
• Read/review/memorize the cryptography
flash cards.
• Homework: Describe the purpose of the
process outline on slide 9 (the previous
slide) ©©Copyright
Copyright2012
2012-2013
– 2013(ISC)²,
(ISC)²,Inc.
Inc.All
AllRights
RightsReserved.
Reserved. For Personal Use of (ISC)2 Seminar Attendee Only.

Answers

(11)
Status NEW Posted 29 Apr 2017 07:04 AM My Price 8.00

-----------

Not Rated(0)