questions in Network Security
• Please fill in the table below
Action Use whose and what key
Create a signature Use _______’s _____ key to encrypt _______
Decrypt a signature to authenticate sender Use _______’s ______key to decrypt _______
Send an encrypted message (such as a session key) with RSA Use _______’s _____ key
Decrypt an encrypted message (such as a session key) with RSA Use _______’s _____ key
Send an encrypted message+signature with AES Use _______’s _____ key
Decrypt an encrypted message+signature with AES Use _______’s _____ key
• Please address the learning objectives (one paragraphs for each objective)
• Identify technical attributes of information security and explain how cryptography helps.
• Understand how symmetric and asymmetric cryptograph works.
• Discuss the pros and cons of symmetric and asymmetric cryptography.
• Identify different roles of encryption key, message digest, and digital signature.