Identify the security threats

1. Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root a = 2.

a. If user A has public key YA = 9, what is A’s private key XA?

b. If user B has public key YB = 3, what is the shared secret key K?

2. What is a key distribution center?

3. What are the advantages of the automated key distribution approach?

4. What is Kerberos?

5. Identify the security threats that exist in an open distributed network.

Solution:

Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Formatting
Title Page
Citation
Place an Order

Calculate your paper price
Pages (550 words)
Approximate price: -