diff options
| author | mo khan <mo@mokhan.ca> | 2021-07-24 20:04:29 -0600 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2021-07-24 20:04:29 -0600 |
| commit | 1b20454fda53227372c3617413a6e3b42815c5f9 (patch) | |
| tree | 45ad7c2f142b878d66a28d73ee78fd1ee605aeb1 | |
| parent | 83587b22b969a6f93a213ad26a67b793538aa70c (diff) | |
answer final question of part 1
| -rw-r--r-- | doc/assignment4.md | 32 |
1 files changed, 25 insertions, 7 deletions
diff --git a/doc/assignment4.md b/doc/assignment4.md index 2eb22b7..f871097 100644 --- a/doc/assignment4.md +++ b/doc/assignment4.md @@ -3,13 +3,6 @@ Assignment 4 -This assignment should be submitted after you have finished Unit 5. -It is worth 15% of your final grade for this course. - -## Part 1: Concepts (20 marks; 4 marks each) - -Please answer the following questions in complete sentences. Your answer for each question should be about 150 words. - 1. Why is it important to distinguish between mechanisms of protection and policies of protection? Protection mechanisms are used to constrain the potential senders and/or @@ -63,4 +56,29 @@ Please answer the following questions in complete sentences. Your answer for eac system crashes and program malfunctions. 1. What is the difference between symmetric encryption and asymmetric encryption? + + Symmetric encryption relies on a single shared key for performing both the + encryption an decryption operations. + + Asymmetric encryption algorithms rely on each party having both a public and + private key. Public keys are exchange so that plaintext can be encrypted into + ciphertext using the other party's public key. Only that party can decrypt + the ciphertext back into plaintext using their private key. + + Symmetric encryption and decryption operations tend to operate faster than + their asymmetric encryption counterparts. So many protocol will use asymmetric + encryption to perform the initial handshake to exchange a shared session key + to perform the remaining operations using the shared session key. + 1. What are the two main varieties of authentication algorithms? + + Message-authentication code (MAC) is a form of an authentication algorithm + that uses symmetric encryption. This algorithm generates a checksum using + the message data and key as input. On the receiving end the checksum and key + can be used to verify the authenticity of the data received. + + The second type of authentication algorithm is a digital signature. + Digital signatures utilize asymmetric encryption by encrypting a + digest of the plaintext data using their own private key. This allows the + receiving party to decrypt the digest using the senders public key to verify + the authenticity of the data. |
