SlideShare a Scribd company logo
6/6/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035-
9055-495e-bca5-81410d36b3ff&course_i… 1/4
%30
%29
SafeAssign Originality Report
Network Security - 201931 - CRN185 - Kotaprolu • Week 4
Assignment Submission
%59Total Score: High riskThakur Prabhakar Jilludimudi
Submission UUID: 8e7e56df-5cd8-fca0-84fd-309126cf0557
Total Number of Reports
1
Highest Match
59 %
Assignment_4.doc
Average Match
59 %
Submitted on
06/06/19
8:47 PM EDT
Average Word Count
934
Highest: Assignment_4.doc
%59Attachment 1
Global database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Institutional database (5)
Student paper Student paper Student paper
Student paper Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 934
Assignment_4.doc
1 2 8
9 5 7
4 3 10
6 11
1 Student paper 4 Student paper 3 Student paper
4.1 List ways in which secret keys can be distributed to two
communicating parties.
1. A key can be selected by party A and physically delivered to
party B.
2. A key can physically be deliver to part A and party B through
a third party. 3. A key can be delivered to both parties through
encryption either through a third
party or among themselves. However, they must have been in
communication before for the encryption to take place.
4.2 What is the difference between a session key and a master
key?
A session key is a temporary key that two principals uses
through encryption. On the other hand, a master key is a long
lasting key used by the key
distribution center. The purpose of the master key is to allow
communication between the principals and the key distribution
center during a transmission
session. More importantly, non-cryptographic means are used
by master keys to distribute session keys. 4.3 What is a key
distribution center?
It determines the entities that are allowed to communicate with
each other. A key distribution center refers to a unit set up to
convey temporary key to the
principals. The center employs the use of encryption to convey
the keys. The center also uses the master key to transmit
communication to the principals.
4.4 What entities constitute a full-service Kerberos
environment?
A full-service Kerberos is characterized by certain mandatory
entities. First, it must have a Kerberos server. Then, it must
have a number of clients. In addition, it
must have a number of application servers.
4.5 In the context of Kerberos, what is a realm?
Kerberos realm occurs in the event of several Kerberos servers.
A user is registered in a database using a unique ID. In addition,
they have hashed passwords stored
in the Kerberos server. The Kerberos server has the ability to
share the stored information with other servers. Therefore, the
realm is the node points where these
servers connect.
4.6 What are the principal differences between version 4 and
version 5 of Kerberos?
1
2
3
1
4 2
4
1
5
1
1
1
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=b98a9035-
9055-495e-bca5-
81410d36b3ff&course_id=_44079_1&download=true&includeD
eleted=true&print=true&force=true
6/6/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035-
9055-495e-bca5-81410d36b3ff&course_i… 2/4
Source Matches (31)
Student paper 100%
Student paper 84%
Student paper 74%
Student paper 100%
The 5th version of Kerberos is supposed to address the
limitations of the 4th version. It overcomes the environmental
shortcomings. It lacks technical
deficiencies experienced with the 4th version. Version 4 had
low functionality levels.
4.7 What is a nonce?
A value that can only be used once. Examples include a
timestamp and a counter. Also include a random number. The
most important requirement is that it should be
different in each transaction.
4.8 What are two different uses of public-key cryptography
related to key distribution?
Public key cryptography can be subjected to two major uses.
First, in public key encryption in which the message is
encrypted by the public key used by the
recipient and can be decryption through a private key. Secondly,
public key is used to create digital signatures. With this, the
message is sent using the private key of
the sender upon which it can be verified by whoever has the
access to the public key.
4.9 What are the essential ingredients of a public-key directory?
There has to be authority in-order to establish a public key
directory. The authority establishes entry for each of the
participants. Thereafter, each of the
participants have to register a public key in the directory
through the authority. Participants can also access the directory
electronically and are often allowed to
replace their public key at given times. Furthermore, it often
serves as a repository of public-key certificates. 4.10 What is a
public-key certificate?
A public key certificate is composed of the public key and the
ID of the owner of the public key. The certificate has to be
signed by a trusted third party. The
information is presented to the authority by the user in a secure
manner. Afterwards, the user is able to print his or her
certificate. Public key certificate is availed to
anyone who verifies the validity of his or her public key
through the way of a signature.
4.11 What are the requirements for the use of a public-key
certificate scheme?
Any participant can verify the currency or expiry of the
certificate. Only the certificate authority can create and update
certificates. Any participant can verify that
the certificate originated from the certificate authority and is
not counterfeit. Any participant can read a certificate to
determine the name and public key of the
certificate’s owner.
4.12 What is the purpose of the X.509 standard?
It is a digital certificate that uses the universally accepted
international X.509 public key infrastructure (PKI) standard. It
is used to verify that the public indeed
belongs to the said user. X.509 specifies a framework for the
provision of authentication services by the X.500 directory to
its users. Additionally, X.509
provides alternative authentication protocols based on the use of
public-key certificates. 4.13 What is a chain of certificates?
This is a series of certificates as created by certification
authorities (CAs). The chain also contains an SSL Certificate.
The chain or path begins with the SSL certificate.
Here, the successive certificate is a certificate by one CA that
certifies the public key of the next CA in the chain.
6
1
1
6 4
1
7
8 1
9
1
4
1
3
10 8
1
11
4.14 How is an X.509 certificate revoked?
They are only considered valid upon use during the validity
period. It can be revoked if considered to be no-longer
trustable. Also revoked prior to the expiry date
defined. The revocation takes place through the use of
Certificate Authority (CA).
1
1
Student paper
4.1 List ways in which secret keys can be
distributed to two communicating
parties.
Original source
4.1 List ways in which secret keys can be
distributed to two communicating parties
2
Student paper
A key can be selected by party A and
physically delivered to party B.
Original source
can be selected by a third party and
physically delivered to A and B
3
Student paper
A key can physically be deliver to part A
and party B through a third party.
Original source
· A third party can select the key and
physically deliver it to A and B
1
Student paper
4.2 What is the difference between a
session key and a master key?
Original source
4.2 What is the difference between a
session key and a master key
6/6/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035-
9055-495e-bca5-81410d36b3ff&course_i… 3/4
Student paper 82%
Student paper 68%
Student paper 63%
Student paper 100%
Student paper 79%
Student paper 100%
Student paper 77%
Student paper 100%
Student paper 68%
Student paper 100%
Student paper 100%
Student paper 64%
Student paper 69%
Student paper 100%
Student paper 72%
Student paper 62%
4
Student paper
A session key is a temporary key that two
principals uses through encryption.
Original source
A session key is a temporary encryption
key used between two principals
2
Student paper
On the other hand, a master key is a long
lasting key used by the key distribution
center.
Original source
A master key is a long lasting key
between a distribution center and a user
or device, used to encode the session
Key
4
Student paper
The purpose of the master key is to allow
communication between the principals
and the key distribution center during a
transmission session.
Original source
A master key is a long-lasting key that is
used between a key distribution center
and a principal for the purpose of
encoding the transmission of session
keys
1
Student paper
4.3 What is a key distribution center?
Original source
4.3 What is a key distribution center
5
Student paper
It determines the entities that are
allowed to communicate with each other.
Original source
It determines which systems are allowed
to communicate with each other
1
Student paper
4.4 What entities constitute a full-service
Kerberos environment?
Original source
4.4 What entities constitute a full-service
Kerberos environment
1
Student paper
Then, it must have a number of clients. In
addition, it must have a number of
application servers. 4.5 In the context of
Kerberos, what is a realm?
Original source
· A number of clients · A number of
application servers 4.5 In the context of
Kerberos, what is a realm
1
Student paper
4.6 What are the principal differences
between version 4 and version 5 of
Kerberos?
Original source
4.6 What are the principal differences
between version 4 and version 5 of
Kerberos
6
Student paper
The 5th version of Kerberos is supposed
to address the limitations of the 4th
version.
Original source
The 5th Version of Kerberos intends to
address the limitations of version 4 in
two areas
1
Student paper
4.7 What is a nonce?
Original source
4.7 What is a nonce
1
Student paper
4.8 What are two different uses of public-
key cryptography related to key
distribution?
Original source
4.8 What are two different uses of public-
key cryptography related to key
distribution
6
Student paper
Public key cryptography can be subjected
to two major uses.
Original source
Public-key cryptography has two
different uses
4
Student paper
First, in public key encryption in which
the message is encrypted by the public
key used by the recipient and can be
decryption through a private key.
Secondly, public key is used to create
digital signatures. With this, the message
is sent using the private key of the
sender upon which it can be verified by
whoever has the access to the public key.
Original source
The public key of the recipient can be
used to encrypt the message, which is in
turn decrypted using a private key
Secondly, public key cryptography is
used as digital signatures The private key
of the sender is used to sign the
message, which is later verified by
recipients with correct public key
1
Student paper
4.9 What are the essential ingredients of
a public-key directory?
Original source
4.9 What are the essential ingredients of
a public-key directory
7
Student paper
Thereafter, each of the participants have
to register a public key in the directory
through the authority.
Original source
· Participants register a public key with a
directory authority
8
Student paper
Furthermore, it often serves as a
repository of public-key certificates.
Original source
The directory may serve as a repository
of public-key certificates
6/6/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035-
9055-495e-bca5-81410d36b3ff&course_i… 4/4
Student paper 100%
Student paper 62%
Student paper 100%
Student paper 97%
Student paper 100%
Student paper 63%
Student paper 92%
Student paper 84%
Student paper 100%
Student paper 90%
Student paper 100%
1
Student paper
4.10 What is a public-key certificate?
Original source
4.10 What is a public-key certificate
9
Student paper
A public key certificate is composed of
the public key and the ID of the owner of
the public key.
Original source
The public key and user ID of the key
owner is presented to the authority and
the certificate is given
1
Student paper
4.11 What are the requirements for the
use of a public-key certificate scheme?
Original source
4.11 What are the requirements for the
use of a public-key certificate scheme
4
Student paper
Any participant can verify the currency or
expiry of the certificate. Only the
certificate authority can create and
update certificates. Any participant can
verify that the certificate originated from
the certificate authority and is not
counterfeit. Any participant can read a
certificate to determine the name and
public key of the certificate’s owner.
Original source
· Any participant can verify the currency
of the certificate · Only the certificate
authority can create and update
certificates · Any participant can verify
that the certificate originated from the
certificate authority and is not
counterfeit Any participant can read a
certificate to determine the name and
public key of the certificate’s owner
1
Student paper
4.12 What is the purpose of the X.509
standard?
Original source
4.12 What is the purpose of the X.509
standard
3
Student paper
It is a digital certificate that uses the
universally accepted international X.509
public key infrastructure (PKI) standard.
Original source
An X.509 certificate is a digital certificate
that uses the widely accepted
international X.509 public key
infrastructure (PKI) standard to verify
that a public key belongs to the user,
computer or service identity contained
within the certificate
10
Student paper
X.509 specifies a framework for the
provision of authentication services by
the X.500 directory to its users.
Original source
X.509 defines a framework for the
provision of authentication services by
the X.500 directory to its users
8
Student paper
Additionally, X.509 provides alternative
authentication protocols based on the
use of public-key certificates.
Original source
The X.509 also defines alternative
authentication protocols based on the
use of public-key certificates
1
Student paper
4.13 What is a chain of certificates?
Original source
4.13 What is a chain of certificates
11
Student paper
Here, the successive certificate is a
certificate by one CA that certifies the
public key of the next CA in the chain.
Original source
A successive certificate is one CA that
certifies the public key of next CA in the
chain
1
Student paper
4.14 How is an X.509 certificate revoked?
Original source
4.14 How is an X.509 certificate revoked
Do the following review questions:
4.1 List ways in which secret keys can be distributed to two
communicating parties.
4.2 What is the difference between a session key and a master
key?
4.3 What is a key distribution center?
4.4 What entities constitute a full-service Kerberos
environment?
4.5 In the context of Kerberos, what is a realm?
4.6 What are the principal differences between version 4 and
version 5 of Kerberos?
4.7 What is a nonce?
4.8 What are two different uses of public-key cryptography
related to key distribution?
4.9 What are the essential ingredients of a public-key directory?
4.10 What is a public-key certificate?
4.11 What are the requirements for the use of a public-key
certificate scheme?
4.12 What is the purpose of the X.509 standard?
4.13 What is a chain of certificates?
4.14 How is an X.509 certificate revoked?
662019 Originality Reporthttpsblackboard.nec.eduweba.docx

More Related Content

Similar to 662019 Originality Reporthttpsblackboard.nec.eduweba.docx

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Ch14
Ch14Ch14
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
AnbuShare
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
Deepak John
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
Information Security Awareness Group
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
Núcleo de Computação Científica
 
Information Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric VanderburgInformation Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric Vanderburg
Eric Vanderburg
 
Key Management
Key Management Key Management
Key Management
Gururaj H L
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
CyberBahn Federal Solutions
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
Sanjeev Raman
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
ijtsrd
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Alpha Education
Alpha EducationAlpha Education
Alpha Education
Alpha20 Group
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
SmeetaJavalagi
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
MehediHasanShaon1
 
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
prensacespi
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
FRSecure
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
manish kumar
 

Similar to 662019 Originality Reporthttpsblackboard.nec.eduweba.docx (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Ch14
Ch14Ch14
Ch14
 
Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
Information Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric VanderburgInformation Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric Vanderburg
 
Key Management
Key Management Key Management
Key Management
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Alpha Education
Alpha EducationAlpha Education
Alpha Education
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 

More from troutmanboris

Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele  Men of ProgressOil on canvas, 1862Coope.docxChristian Schussele  Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
troutmanboris
 
Christian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docxChristian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docx
troutmanboris
 
Christian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docxChristian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docx
troutmanboris
 
CHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docxCHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docx
troutmanboris
 
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docxChrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
troutmanboris
 
Chosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docxChosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docx
troutmanboris
 
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docxChose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
troutmanboris
 
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docxChoosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
troutmanboris
 
Choosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docxChoosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docx
troutmanboris
 
Choosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docxChoosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docx
troutmanboris
 
Choose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docxChoose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docx
troutmanboris
 
Choose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docxChoose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docx
troutmanboris
 
Choose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docxChoose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docx
troutmanboris
 
Choose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docxChoose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docx
troutmanboris
 
Choose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docxChoose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docx
troutmanboris
 
Choose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docxChoose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docx
troutmanboris
 
Choose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docxChoose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docx
troutmanboris
 
Choose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docxChoose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docx
troutmanboris
 
Choose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docxChoose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docx
troutmanboris
 
Choose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docxChoose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docx
troutmanboris
 

More from troutmanboris (20)

Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele  Men of ProgressOil on canvas, 1862Coope.docxChristian Schussele  Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
 
Christian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docxChristian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docx
 
Christian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docxChristian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docx
 
CHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docxCHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docx
 
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docxChrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
 
Chosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docxChosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docx
 
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docxChose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
 
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docxChoosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
 
Choosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docxChoosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docx
 
Choosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docxChoosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docx
 
Choose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docxChoose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docx
 
Choose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docxChoose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docx
 
Choose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docxChoose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docx
 
Choose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docxChoose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docx
 
Choose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docxChoose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docx
 
Choose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docxChoose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docx
 
Choose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docxChoose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docx
 
Choose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docxChoose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docx
 
Choose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docxChoose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docx
 
Choose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docxChoose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docx
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

662019 Originality Reporthttpsblackboard.nec.eduweba.docx

  • 1. 6/6/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035- 9055-495e-bca5-81410d36b3ff&course_i… 1/4 %30 %29 SafeAssign Originality Report Network Security - 201931 - CRN185 - Kotaprolu • Week 4 Assignment Submission %59Total Score: High riskThakur Prabhakar Jilludimudi Submission UUID: 8e7e56df-5cd8-fca0-84fd-309126cf0557 Total Number of Reports 1 Highest Match 59 % Assignment_4.doc Average Match 59 % Submitted on 06/06/19 8:47 PM EDT
  • 2. Average Word Count 934 Highest: Assignment_4.doc %59Attachment 1 Global database (6) Student paper Student paper Student paper Student paper Student paper Student paper Institutional database (5) Student paper Student paper Student paper Student paper Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 934 Assignment_4.doc 1 2 8 9 5 7 4 3 10 6 11
  • 3. 1 Student paper 4 Student paper 3 Student paper 4.1 List ways in which secret keys can be distributed to two communicating parties. 1. A key can be selected by party A and physically delivered to party B. 2. A key can physically be deliver to part A and party B through a third party. 3. A key can be delivered to both parties through encryption either through a third party or among themselves. However, they must have been in communication before for the encryption to take place. 4.2 What is the difference between a session key and a master key? A session key is a temporary key that two principals uses through encryption. On the other hand, a master key is a long lasting key used by the key distribution center. The purpose of the master key is to allow communication between the principals and the key distribution center during a transmission session. More importantly, non-cryptographic means are used by master keys to distribute session keys. 4.3 What is a key distribution center? It determines the entities that are allowed to communicate with each other. A key distribution center refers to a unit set up to convey temporary key to the principals. The center employs the use of encryption to convey
  • 4. the keys. The center also uses the master key to transmit communication to the principals. 4.4 What entities constitute a full-service Kerberos environment? A full-service Kerberos is characterized by certain mandatory entities. First, it must have a Kerberos server. Then, it must have a number of clients. In addition, it must have a number of application servers. 4.5 In the context of Kerberos, what is a realm? Kerberos realm occurs in the event of several Kerberos servers. A user is registered in a database using a unique ID. In addition, they have hashed passwords stored in the Kerberos server. The Kerberos server has the ability to share the stored information with other servers. Therefore, the realm is the node points where these servers connect. 4.6 What are the principal differences between version 4 and version 5 of Kerberos? 1 2 3 1 4 2 4
  • 6. shortcomings. It lacks technical deficiencies experienced with the 4th version. Version 4 had low functionality levels. 4.7 What is a nonce? A value that can only be used once. Examples include a timestamp and a counter. Also include a random number. The most important requirement is that it should be different in each transaction. 4.8 What are two different uses of public-key cryptography related to key distribution? Public key cryptography can be subjected to two major uses. First, in public key encryption in which the message is encrypted by the public key used by the recipient and can be decryption through a private key. Secondly, public key is used to create digital signatures. With this, the message is sent using the private key of the sender upon which it can be verified by whoever has the access to the public key. 4.9 What are the essential ingredients of a public-key directory? There has to be authority in-order to establish a public key directory. The authority establishes entry for each of the participants. Thereafter, each of the participants have to register a public key in the directory through the authority. Participants can also access the directory electronically and are often allowed to replace their public key at given times. Furthermore, it often serves as a repository of public-key certificates. 4.10 What is a
  • 7. public-key certificate? A public key certificate is composed of the public key and the ID of the owner of the public key. The certificate has to be signed by a trusted third party. The information is presented to the authority by the user in a secure manner. Afterwards, the user is able to print his or her certificate. Public key certificate is availed to anyone who verifies the validity of his or her public key through the way of a signature. 4.11 What are the requirements for the use of a public-key certificate scheme? Any participant can verify the currency or expiry of the certificate. Only the certificate authority can create and update certificates. Any participant can verify that the certificate originated from the certificate authority and is not counterfeit. Any participant can read a certificate to determine the name and public key of the certificate’s owner. 4.12 What is the purpose of the X.509 standard? It is a digital certificate that uses the universally accepted international X.509 public key infrastructure (PKI) standard. It is used to verify that the public indeed belongs to the said user. X.509 specifies a framework for the provision of authentication services by the X.500 directory to its users. Additionally, X.509 provides alternative authentication protocols based on the use of public-key certificates. 4.13 What is a chain of certificates?
  • 8. This is a series of certificates as created by certification authorities (CAs). The chain also contains an SSL Certificate. The chain or path begins with the SSL certificate. Here, the successive certificate is a certificate by one CA that certifies the public key of the next CA in the chain. 6 1 1 6 4 1 7 8 1 9 1 4 1 3 10 8 1 11
  • 9. 4.14 How is an X.509 certificate revoked? They are only considered valid upon use during the validity period. It can be revoked if considered to be no-longer trustable. Also revoked prior to the expiry date defined. The revocation takes place through the use of Certificate Authority (CA). 1 1 Student paper 4.1 List ways in which secret keys can be distributed to two communicating parties. Original source 4.1 List ways in which secret keys can be distributed to two communicating parties 2 Student paper A key can be selected by party A and physically delivered to party B. Original source can be selected by a third party and physically delivered to A and B
  • 10. 3 Student paper A key can physically be deliver to part A and party B through a third party. Original source · A third party can select the key and physically deliver it to A and B 1 Student paper 4.2 What is the difference between a session key and a master key? Original source 4.2 What is the difference between a session key and a master key 6/6/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035- 9055-495e-bca5-81410d36b3ff&course_i… 3/4 Student paper 82% Student paper 68%
  • 11. Student paper 63% Student paper 100% Student paper 79% Student paper 100% Student paper 77% Student paper 100% Student paper 68% Student paper 100% Student paper 100% Student paper 64% Student paper 69% Student paper 100% Student paper 72% Student paper 62% 4 Student paper A session key is a temporary key that two principals uses through encryption. Original source
  • 12. A session key is a temporary encryption key used between two principals 2 Student paper On the other hand, a master key is a long lasting key used by the key distribution center. Original source A master key is a long lasting key between a distribution center and a user or device, used to encode the session Key 4 Student paper The purpose of the master key is to allow communication between the principals and the key distribution center during a transmission session. Original source A master key is a long-lasting key that is used between a key distribution center and a principal for the purpose of encoding the transmission of session keys
  • 13. 1 Student paper 4.3 What is a key distribution center? Original source 4.3 What is a key distribution center 5 Student paper It determines the entities that are allowed to communicate with each other. Original source It determines which systems are allowed to communicate with each other 1 Student paper 4.4 What entities constitute a full-service Kerberos environment? Original source 4.4 What entities constitute a full-service Kerberos environment 1
  • 14. Student paper Then, it must have a number of clients. In addition, it must have a number of application servers. 4.5 In the context of Kerberos, what is a realm? Original source · A number of clients · A number of application servers 4.5 In the context of Kerberos, what is a realm 1 Student paper 4.6 What are the principal differences between version 4 and version 5 of Kerberos? Original source 4.6 What are the principal differences between version 4 and version 5 of Kerberos 6 Student paper The 5th version of Kerberos is supposed to address the limitations of the 4th version. Original source
  • 15. The 5th Version of Kerberos intends to address the limitations of version 4 in two areas 1 Student paper 4.7 What is a nonce? Original source 4.7 What is a nonce 1 Student paper 4.8 What are two different uses of public- key cryptography related to key distribution? Original source 4.8 What are two different uses of public- key cryptography related to key distribution 6 Student paper Public key cryptography can be subjected to two major uses.
  • 16. Original source Public-key cryptography has two different uses 4 Student paper First, in public key encryption in which the message is encrypted by the public key used by the recipient and can be decryption through a private key. Secondly, public key is used to create digital signatures. With this, the message is sent using the private key of the sender upon which it can be verified by whoever has the access to the public key. Original source The public key of the recipient can be used to encrypt the message, which is in turn decrypted using a private key Secondly, public key cryptography is used as digital signatures The private key of the sender is used to sign the message, which is later verified by recipients with correct public key 1 Student paper 4.9 What are the essential ingredients of a public-key directory?
  • 17. Original source 4.9 What are the essential ingredients of a public-key directory 7 Student paper Thereafter, each of the participants have to register a public key in the directory through the authority. Original source · Participants register a public key with a directory authority 8 Student paper Furthermore, it often serves as a repository of public-key certificates. Original source The directory may serve as a repository of public-key certificates 6/6/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
  • 18. BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035- 9055-495e-bca5-81410d36b3ff&course_i… 4/4 Student paper 100% Student paper 62% Student paper 100% Student paper 97% Student paper 100% Student paper 63% Student paper 92% Student paper 84% Student paper 100% Student paper 90% Student paper 100% 1 Student paper 4.10 What is a public-key certificate? Original source 4.10 What is a public-key certificate 9
  • 19. Student paper A public key certificate is composed of the public key and the ID of the owner of the public key. Original source The public key and user ID of the key owner is presented to the authority and the certificate is given 1 Student paper 4.11 What are the requirements for the use of a public-key certificate scheme? Original source 4.11 What are the requirements for the use of a public-key certificate scheme 4 Student paper Any participant can verify the currency or expiry of the certificate. Only the certificate authority can create and update certificates. Any participant can verify that the certificate originated from the certificate authority and is not counterfeit. Any participant can read a
  • 20. certificate to determine the name and public key of the certificate’s owner. Original source · Any participant can verify the currency of the certificate · Only the certificate authority can create and update certificates · Any participant can verify that the certificate originated from the certificate authority and is not counterfeit Any participant can read a certificate to determine the name and public key of the certificate’s owner 1 Student paper 4.12 What is the purpose of the X.509 standard? Original source 4.12 What is the purpose of the X.509 standard 3 Student paper It is a digital certificate that uses the universally accepted international X.509 public key infrastructure (PKI) standard. Original source
  • 21. An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) standard to verify that a public key belongs to the user, computer or service identity contained within the certificate 10 Student paper X.509 specifies a framework for the provision of authentication services by the X.500 directory to its users. Original source X.509 defines a framework for the provision of authentication services by the X.500 directory to its users 8 Student paper Additionally, X.509 provides alternative authentication protocols based on the use of public-key certificates. Original source The X.509 also defines alternative authentication protocols based on the use of public-key certificates
  • 22. 1 Student paper 4.13 What is a chain of certificates? Original source 4.13 What is a chain of certificates 11 Student paper Here, the successive certificate is a certificate by one CA that certifies the public key of the next CA in the chain. Original source A successive certificate is one CA that certifies the public key of next CA in the chain 1 Student paper 4.14 How is an X.509 certificate revoked? Original source 4.14 How is an X.509 certificate revoked
  • 23. Do the following review questions: 4.1 List ways in which secret keys can be distributed to two communicating parties. 4.2 What is the difference between a session key and a master key? 4.3 What is a key distribution center? 4.4 What entities constitute a full-service Kerberos environment? 4.5 In the context of Kerberos, what is a realm? 4.6 What are the principal differences between version 4 and version 5 of Kerberos? 4.7 What is a nonce? 4.8 What are two different uses of public-key cryptography related to key distribution? 4.9 What are the essential ingredients of a public-key directory? 4.10 What is a public-key certificate? 4.11 What are the requirements for the use of a public-key certificate scheme? 4.12 What is the purpose of the X.509 standard? 4.13 What is a chain of certificates? 4.14 How is an X.509 certificate revoked?