relationship between hashing and digital signatures

Task 1: Below are listed a set of topics. You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

• Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
• Raise questions about the information provided by other students (this must be done in an adequately professional manner)
• Respond to questions raised about your own information and other student’s
• Contribute to discussions in general

Note that the aim of this task is:

• To build an understanding and perspective of current hot topics in Network Security; and
• To build generic skills including, but not limited to
o A capacity for teamwork and collaboration
o An ability for critical thinking, analysis and problem solving
o Gaining or improving information technological literacy
o A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.Task 2: Security Infrastructure and Protocols

a) PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a “top-down” approach to trust and PGP is a “bottom-up” approach to trust.

b) The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base .

Task 3: Security Primitives

a) Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

b) What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c) Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.

Order from us and get better grades. We are the service you have been looking for.