Q1: Explain the Deffie-Hallman algorithm for 3 parties Alice, Bob and Carol?
P=23, g=5, Alice Secret key x=5, Bob Secret key y=9, Carol Secret key z=16. Q2: Generate public and private key pair using RSA {23, 29}? Use algorithm to calculate the values required? a. Party A, SIGN a message using its private key? b. Party B, verify the SIGNATURE using Party A public key Note: use public key exponent e=17, use square and multiply algorithm to SIGN and verify message?
Q3: Explain the structure of following hash algorithms? Also explain some applications? SHA-256
Applications
For more details on this topic, see Cryptographic hash function#Applications. The SHA-2 hash function is implemented in some widely-used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, Bitcoin and IPsec. SHA-1 and SHA-2 are the secure hash algorithms required by law for use in certain U.S. Government applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information. FIPS PUB 180-1 also encouraged adoption and use of SHA-1 by private and commercial organizations. SHA-1 is being retired for most government uses; the U.S. National Institute of Standards and Technology says, "Federal agencies should stop using SHA-1 for...applications that require collision resistance as soon as practical, and must use the SHA-2 family of hash functions for these applications after 2010" (emphasis in original).[14]
HMAC MD-5
Q4: Design a Secure (hybrid cryptographic) system for email security, using RSA, AES and SHA-1?
Q5: Explain following terms with respect to Security? Information Security Application Security Security Auditing Business Continuity Planning Risk Management Physical Security Classification for information Single Sign-on
Q6: What is SELinux? Explain key features with respect to any latest version of Linux? Q7: When designing software, what are some security mechanisms that a developer has to be met? Discuss related to access control? Take an example of a Student Information System (SIS)?