1)DISCUSSIONBOARD (200 WORDS)Please Note:This is not the same as the Discussion Board assignment, the principalingredients of a public-key cryptosystem.. What is a hashvalue, and why do you think it...

1 answer below »

1)


DISCUSSION
BOARD (200 WORDS)







Please Note:
This is not the same as the Discussion Board assignment, the principal
ingredients of a public-key cryptosystem.






. What is a hash
value, and why do you think it is important?






 Explain how a hash
value can be made secure to provide message authentication.






 Provide an example
as it applies to your current job or life.






 What are the
benefits of implementing hash values?











2)


INDIVIDUAL PROJECT (800 WORDS)






Review the followingLinkedIn Learning videosto help you with your
assignments in this Unit.






Secure hash function (one-way hash function) is not only
used in message authentication but in digit signatures (Stallings & Brown,
2018).






Using the APA writing style, write a 4–page paper that
answers the following questions and within the provided structure:









  • Introduction



  • What

    are some principles of remote user-authentication?



  • What

    is the purpose of remote user-authentication?



  • How do

    users implement remote user authentication using symmetric encryption?



  • How do

    users implement remote user authentication using asymmetric encryption?

    How is Federated Identity Management and Personal Identify Verification

    important to users?



  • Conclusion



  • APA

    Reference List








Answered 2 days AfterOct 19, 2022

Answer To: 1)DISCUSSIONBOARD (200 WORDS)Please Note:This is not the same as the Discussion Board assignment,...

Shubham answered on Oct 22 2022
58 Votes
CRYPTOGRAPH AND HASH
Table of Contents
1.    Discussion Board    2
2.    Individual Report    3
Introduction    3
Principles of remote user-authentication    3
Purpose of remote user-authentication    3
Implementation of remote user authentication using sy
mmetric encryption    4
Implementation of remote user authentication using asymmetric encryption    5
Importance of Federated Identity Management and Personal Identity Verification    5
Conclusion    5
References    7
1. Discussion Board
Hash value is the specific number that is created through the algorithm that includes a the particular file. It is important because it can help in proving the way for verifying and identifying chunks of the digital data. Hash value can be made secure by using secret keys that should be used in the way the hash function is used for producing authentication (Shrivastava & Tiwary, 2018). It can help in defining the secret key that is calculated with integrity check code that provides authentication. Hash value can be used for storing the graphics storage of the object. The data can be organized with the use of hashing and it can also be used for making a grid of appropriate size. All points stored in one cell can be saved to the same place. The hash function can be used for mapping of the cell grid for the allocation of memory location and it is the key advantage with the method for storing and fast execution (Liu, Kadir & Liu, 2019). The implementation of hash value can be used for retrieving and indexing information from the database that can help in accelerating the process. It makes finding items easier with the use of a shorter hashed key than the original value.
2. Individual Report
Introduction
     Remote user-authentication allows the user to authenticate the system with the use of credentials that are stored on the external authentication service. The configuration of the service required the system along with assigning additional passwords.
Principles of remote user-authentication
Remote user-authentication principle includes fundamental security building blocks and it includes the basis of user accountability and access control. The process includes identification and verification of system entities. It includes two steps that are verification and identification. The identification step includes presentation of the identifier for the security team because the authenticated identities based on the security...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here