CENG XXXXXXXXXXAssignment 1 Page 1 Instructions:  Research 2 of the following topics.  Each topic must be 2.5 – 3 pages of 1.5 spaced, 11-point font size.  If you are using diagrams in your...

1 answer below »
network


CENG-10012 Assignment 1 Page 1 Instructions:  Research 2 of the following topics.  Each topic must be 2.5 – 3 pages of 1.5 spaced, 11-point font size.  If you are using diagrams in your explanation, they must not comprise more than a half page per topic.  Do not copy text or diagrams from textbooks or internet sources into your work. Such submissions will probably be graded as 0 and cited for academic dishonesty.  Cite your references. References must be on a separate page.  Use the template provided as a starting point for this assignment. Topics 1. HTTPS uses public/private key encryption, which is a form of Asymmetric Encryption. The alternative is Symmetric Encryption. a. Explain how symmetric encryption works. Use diagrams (up to 2, that you create) to aid your explanation. b. Provide an example of where symmetric encryption is used today c. Compare the relative security of symmetric and asymmetric encryption. 2. Encryption is not new! The Enigma machine1 created by Germany during World War 2 was very effective for sending encrypted instructions to their troops. a. What type of encryption (asymmetric/symmetric) did it employ? b. Provide an overview of how it worked and why it was so effective. c. How were messages eventually decoded? 3. In the lab you installed an SSH server on Windows Server 2019. This allows clients to remotely connect securely to the server and transfer files securely. We will dive deeper into this server when Linux is introduced later in the course. SSH uses several encryption methods to securely communicate between client and server. Explain how an SSH client initiates and establishes a secure connection with an SSH server. Create your own diagrams to assist with your explanation. 1 Need a distraction from your studies? The Imitation Game is an interesting movie showing how Britain eventually deciphered Enigma messages. You can stream it for free via the college library’s movie streaming service (Criterion on Demand). Login with your student ID and password, not [email protected]). https://media3-criterionpic-com.ezproxy.mohawkcollege.ca/htbin/wwform/006?T=2166936E mailto:[email protected] Student and Number CENG-10012 Advanced Server Assignment #1 Statement of Authorship I, STUDENT NAME, STUDENT NUMBER certify that this material is my original work. No other person's work has been used without due acknowledgement. I have not made my work available to anyone else. Insert Your Topic #1 Title Here Insert Your Topic #2 Title Here References 1. URL of website 2. Last name, first name, Article or Book, Pages X-X
Answered Same DayMar 31, 2021

Answer To: CENG XXXXXXXXXXAssignment 1 Page 1 Instructions:  Research 2 of the following topics.  Each topic...

Deepti answered on Apr 01 2021
170 Votes
Student and Number
CENG-10012 Advanced Server
Assignment #1
Statement of Authorship
I, STUDENT NAME, STUDENT NUM
BER certify that this material is my original work. No other person's work has been used without due acknowledgement. I have not made my work available to anyone else.
Symmetric Encryption
Symmetric encryption is a two-way encryption process in which symmetric ciphers generate same cipher text using a block of text and a key (Johnson, 2004). The key comprises of random string of letters or numbers generated through secure random number generator. The same key may be used on the ciphertext block to generate the original text. This method uses single key for encrypting and decrypting information. The parties that communicate and exchange data through symmetric encryption, share the key for decryption. Anyone who does not possess the key, will not be able to decrypt and access the data. Therefore, it is also called Secret Key Cryptography. The diagram below shows how symmetric encryption works.
Symmetric encryption is used in payment transactions like credit card transactions, where personal information is protected against...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here