Questions for Chapter 8
-
What is the weakness of using passwords as an authentication
mechanism, even when they are encrypted?
Describe how you get a more secure authentication?
-
What is the primary difference between symmetric key and
public key encryption systems?
-
Why is symmetric key encryption is often used for encrypting a network
connection?
-
What are the two parts of a RSA encryption key?
How are they used to encrypt a message?
-
Alice wants to send a secret message to Bob using public key
encryption.
Whose key does she use?
Which key?
-
Alice wants to digitally sign a document that she is sending to Bob
using public key encryption.
Whose key does she use?
Which key?
-
What is a certification authority?
What purpose does it serve?
-
Briefly describe the two major types of firewalls.