Network Security

questions in Network Security

•    Please fill in the table below

Action    Use whose and what key
Create a signature    Use  _______’s _____ key to encrypt _______
Decrypt a signature to authenticate sender    Use  _______’s ______key to decrypt _______
Send an encrypted message (such as a session key) with RSA    Use  _______’s _____ key
Decrypt an encrypted message (such as a session key) with RSA    Use  _______’s _____ key
Send an encrypted message+signature with AES    Use  _______’s _____ key
Decrypt an encrypted message+signature with AES    Use  _______’s _____ key

•    Please address the learning objectives (one paragraphs for each objective)

•    Identify technical attributes of information security and explain how cryptography helps.

•    Understand how symmetric and asymmetric cryptograph works.

•    Discuss the pros and cons of symmetric and asymmetric cryptography.

•    Identify different roles of encryption key, message digest, and digital signature.