Discussion

Anonymous
timer Asked: Nov 16th, 2016

Question description

1. Overview of the Cryptography Domain


After reading/viewing this week's materials, please respond to one or more of the following questions.

  1. Describe in your own words the differences between steganography, digital watermarking, and digital rights management.
  2. Choose three of the basic cryptosystems and give an overview of each.
  3. Describe the operation of a one-time pad (OTP) and give an example of a device that uses an OTP either from your own experience or from research.

You must start a thread before you can read and reply to other threads

2 Encryption, Hashing and Digital Signature Methods


Actions for Encryption, Hashing and Digital Signature Methods

Must post first.

After reading/viewing this week's materials, please respond to one or more of the following questions.

  1. What are the strengths and weaknesses of symmetric key cryptography? Give an example of where this type of cryptography is used. What are the strengths and weaknesses of asymmetric key cryptography? Give an example of where this type of cryptography is used.
  2. What are the types of message integrity controls and what benefit is provided by them? Give a short description of the various secure email protocols that are referenced in the Shon Harris book and the Course Content.
  3. What benefit do digital signatures provide and what are their characteristics? In your own words, what does non-repudiation mean?

You must start a thread before you can read and reply to other threads

3.Key Management, Cryptosystems, and Cryptanalysis


Actions for Key Management, Cryptosystems, and Cryptanalysis


After reading/viewing this week's materials, please respond to one or more of the following questions.

  1. Define cryptanalysis and describe some of the common cryptanalytic techniques used to attack plaintext, ciphertext, ciphers, and hashes.
  2. What factors affect the strength of an algorithm or cryptosystem? What are some common weaknesses that affect them?
  3. Describe the functions of key management and the key agreement schemes used.

Tutor Answer

(Top Tutor) Studypool Tutor
School: University of Maryland
Studypool has helped 1,244,100 students
flag Report DMCA
Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors