Telecommunications and Network Engineering Sub-module

disturbeddeterminedΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 4 μήνες)

51 εμφανίσεις

Telecommunications and Network Engineering Sub
-
module

Network Security

Assignment

Some primary reference resources are found at the
U.S. National Institute of Science
and Technology

(NIST). This is an extremely useful s
ite and we encourage you to
spend some time there. Another major resource is the
RSA Laboratories Web Site
.

The area in the NIST site that we are interested in is called
“Security in Open
Systems”



References






1.


“Cryptography Overview”


周楳⁩猠s 湫⁴漠n桥⁕⹓⸠乡瑩潮o氠I湳瑩瑵te映却a湤n牤猠
a湤⁔nc桮潬hgy



“Fa
ct Sheet on the Digital Signature Standard”

周楳⁩猠s 湫⁴漠n桥⁕⹓⸠乡瑩潮o氠I湳瑩瑵te映却a湤n牤猠
a湤⁔nc桮潬hgy

Additional
References

(For those that wish
to read further)

a)

“The Directory: Authentication Framework”, ITU
-

oec潭oe湤n瑩潮⁘⸵〹o⁎潶‱
㤹9



RSA Laboratories Cryptography FAQ’s

周楳⁩猠s 湫⁴漠n桥⁒p䄠ia扯牡瑯物t猠se戠b楴e



“Secure Hash Standard”, FIPS Pub 180
-
1

周楳⁩猠s
楮欠i漠瑨攠o⹓⸠乡瑩潮o氠I湳瑩瑵te映却a湤n牤猠
a湤⁔nc桮潬hgy



“Digital Signature Standard”, FIPS PUB 186

周楳⁩猠s 湫⁴漠n桥⁕⹓⸠乡瑩潮o氠I湳瑩瑵te映却a湤n牤猠
a湤⁔nc桮潬hgy



Data Encryption Standard (DES), FIPS PUB 46
-
3


This is a link to the U.S. National Institute of Standards
and Technology

(Note that this is a pdf file of about 26
pages)

f)

Advanced Encryption Standard (AES)

This is a link to the U.S. National Institute of Standards
and Technology

Question 1

a)

Describe what Identification is and what Authentication is and why they are
important

in
Communication
Network Management

b)

Describe three basic approaches to Identification and Authentication and
give examples of how these approaches may be implemented
.

c)

Describe in an overview sense how Public Key Cryptography a
nd Secret
Key Cryptography wo
rk.

d)

Describe what a Message Digest is and how it is used in Digital Signatures.

e)

Describe how Message Digests can be used to make to Password approach
to authentication more secure
.

f)

Show how Digital Signatures authenticate the sender and how they show
wheth
er a message has been modified
.

g)

Describe what a Digital Certificate is and how it is used in a communication
.

h)

Discuss how an authenticated and secure communication can be established
using Digital Certificates, Public Key Cryptography and Secret Key
Crypto
graphy
.