Page |1
HOMEWORK CHAPTER 8
Student Name: Location:
Answer the following questions and upload your document on blackboard under
Homework Chapter 8.
1. What are cryptography and cryptanalysis?
a. While cryptanalysis studies analyzing of information systems so as to study the
hidden aspects of their systems, cryptanalysis is used for the purposes of
breaching cryptographic security systems to gain access to their encrypted
messages.
ISS210
Page |2
10. What is the difference between digital signatures and digital certificates?
a. A digital signature can be described as a unique and mathematically computed
signature which ensures accountability while a A digital certificate enables unique
identification of an entity similar to an electronic ID and issued by a trusted third
party.
11. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid
method like Diffie-Hellman?
a. With this type of digital encryption, a number raised to specific powers is is used
to produce decryption keys. Such keys are never directly transmitted and therefore
making the task of a hacker or code breaker mathematically overwhelming and
practically impossible.
13. What security protocols are predominantly used in Web-based electronic commerce?
a. These security protocols include Secure Sockets Layer (SSL) which is the
technology used to encrypt and decrypt messages sent between the browsers and
servers. By encrypting the data, messages are protected from being read while in
transit across the Internet. SSL encrypts a message from the browser before
sending to the server. When the message is received by the server, it is decrypted
and verified as coming from the correct sender. This is known as authentication.
ISS210
Page |3
cryptography. In this scenario, users each publish a public key that others can use
to encrypt messages to them while they keep secret a private key used to decrypt
such messages.
17. If you were setting up an encryption-based network, what size key would you chose and
why?
a. 104-bit size key encryption standard
18. What is the average key size of a strong encryption system in use today?
a. 128-bit keys.
20. What is the most popular symmetric encryption system used over the Web? The most
popular asymmetric system? Hybrid system?
a. Uses two different but related keys; either key can encrypt or decrypt message. If
Key A encrypts message, only Key B can decrypt
b. Highest value when one key serves as private key and the other serves as public
key