If you send an email or message to the instructor, and a reply is not provided in a timely manner, you should…
Assignments are due weekly, however, to be helpful, the inst…
Assignments are due weekly, however, to be helpful, the instructor has made a final due date for chapters 1 – 10 on what date? At that time, chapters 1 – 10 will no longer be accessible for submissions.
See the previous question. Alice and Bob are using the Diffi…
See the previous question. Alice and Bob are using the Diffie-Hellman scheme. Charlie wants to interfere with their use of it. Give the full name for the type of attack that Charlie is likely to attempt:
The input to a simple encryption algorithm is a block of 8 b…
The input to a simple encryption algorithm is a block of 8 bits, which we can represent as ABCDEFGH. Show the result of a circular shift of 5 positions to the right on this data block.
Suppose you browse to a website that presents a typical X.50…
Suppose you browse to a website that presents a typical X.509 certificate chain, containing three (3) certificates. The certificate at the bottom of the chain is for the website. You browser shows that the certificate is verified. Which of the following is/are true about the certificate at the top of the chain?
A = 101010102 B = 000011112 Show the value of C = A XOR B…
A = 101010102 B = 000011112 Show the value of C = A XOR B 2
A scheme developed by Whit Diffie, Martin Hellman, and Ralph…
A scheme developed by Whit Diffie, Martin Hellman, and Ralph Merkle is commonly called “Diffie‑Hellman”. What does it enable?
“Breaking” an RSA scheme is considered computationally infea…
“Breaking” an RSA scheme is considered computationally infeasible. Explain why. Hint: Consider the problem that is infeasible to solve.
General purpose data (files, messages, webpages, etc.) shoul…
General purpose data (files, messages, webpages, etc.) should be encrypted / decrypted in mode. Give the complete name, not an abbreviation.
A hacker in Albania posts a provocative political message to…
A hacker in Albania posts a provocative political message to a social media site, with an online poll asking if the readers agrees or disagrees. If any user clicks on either of the poll answers, one of many servers operated by the hacker continually sends packets of random data to the user’s IP address for 24 hours, overwhelming the user’s network connection and making it impossible to effectively connect to any online application. Sending a massive amount of data like this is best described as a/an attack. Give the complete name, not an abbreviation.