6/6/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=b98a9035-9055-495e-bca5-81410d36b3ff&course_i… 1/4 %30 %29 SafeAssign Originality Report Network Security - 201931 - CRN185 - Kotaprolu • Week 4 Assignment Submission %59Total Score: High riskThakur Prabhakar Jilludimudi Submission UUID: 8e7e56df-5cd8-fca0-84fd-309126cf0557 Total Number of Reports 1 Highest Match 59 % Assignment_4.doc Average Match 59 % Submitted on 06/06/19 8:47 PM EDT Average Word Count 934 Highest: Assignment_4.doc %59Attachment 1 Global database (6) Student paper Student paper Student paper Student paper Student paper Student paper Institutional database (5) Student paper Student paper Student paper Student paper Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 934 Assignment_4.doc 1 2 8 9 5 7 4 3 10 6 11 1 Student paper 4 Student paper 3 Student paper 4.1 List ways in which secret keys can be distributed to two communicating parties. 1. A key can be selected by party A and physically delivered to party B. 2. A key can physically be deliver to part A and party B through a third party. 3. A key can be delivered to both parties through encryption either through a third party or among themselves. However, they must have been in communication before for the encryption to take place. 4.2 What is the difference between a session key and a master key? A session key is a temporary key that two principals uses through encryption. On the other hand, a master key is a long lasting key used by the key distribution center. The purpose of the master key is to allow communication between the principals and the key distribution center during a transmission session. More importantly, non-cryptographic means are used by master keys to distribute session keys. 4.3 What is a key distribution center? It determines the entities that are allowed to communicate with each other. A key distribution center refers to a unit set up to convey temporary key to the principals. The center employs the use of encryption to convey the keys. The center also uses the master key to transmit communication to the principals. 4.4 What entities constitute a full-service Kerberos environment? A full-service Kerberos is characterized by certain mandatory entities. First, it must have a Kerberos server. Then, it must have a number of clients. In addition, it must have a number of application servers. 4.5 In the context of Kerberos, what is a realm? Kerberos realm occurs in the event of several Kerberos servers. A user is registered in a database using a unique ID. In addition, they have hashed passwords stored in the Kerberos server. The Kerberos server has the ability to share the stored information with other servers. Therefore, the realm is the node points where these servers connect. 4.6 What are the principal differences between v.