Homework 8


Answer the following questions about Kurose and Ross, Chapters 8 and 9. You only need to turn in those that have a point count assigned.

  1. What is the weakness of using passwords as an authentication mechanism, even when they are encrypted? Describe how you get a more secure authentication?
  2. (1 points) What is the primary difference between symmetric key and public key encryption systems?
  3. Why is symmetric key encryption is often used for encrypting a network connection?
  4. (1 points) What are the two parts of a RSA encryption key? How are they used to encrypt a message?
  5. (1 points) Alice wants to send a secret message to Bob using public key encryption. Whose key does she use? Which key?
  6. (1 points) Alice wants to digitally sign a document that she is sending to Bob using public key encryption. Whose key does she use? Which key?
  7. What is a certification authority? What purpose does it serve?
  8. (1 points) Briefly describe the two major types of firewalls.
  9. In a network management protocol what is the relationship between managed devices and agents?
  10. What is ASN.1?
  11. What is a managing information base?