Suppose you are designing a TCB for a system that will need

Suppose you are designing a TCB for a system that will need to communicate over the Internet. Describe cryptographic methods you could use to implement a trusted path between systems.

Solution

Here some of the cryptographic methods used to implement a trusted path between systems..

(i) Symmetric cryptography
--------------------------------------------
It is most traditional form cryptography method. In this method both parties share comon secret password.
This method is very fast. Some of the methods are DES, 3DES and AES. Normally use 56-bit


(ii)
Asymmetric cryptography..
----------------------------------------
It uses two keys one for encryption purpose and another for decryption purpose. These keys are not shared
with two parties. Comparive to symmetric xryptography it is bot slower but more powerful and secure.
Examples are PGP and SSL.


(iii)
Hashes
-----------------
This method will take some data of aribitary length to generate key. And this key is based on input.
It is easy to encrypt data but bery difficult to decrypt to priginal text. So thats why these algorithms are
very widely used abd powerful.
Examples are MD5 and SHA-1.

Suppose you are designing a TCB for a system that will need to communicate over the Internet. Describe cryptographic methods you could use to implement a truste

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site