Expert answer:Cumulative Review of Cryptography Concepts, assign

Answer & Explanation:Cumulative Review of Cryptography Concepts
Complete the following exercises. Save the document with your last name
and submit it to the Assignment Files tab.
File needed to complete this attachment is attached as a Word document.
cmgt432_r5_wk5_assignment.doc

Unformatted Attachment Preview

CMGT/432v5 Introduction to Cryptography
Cumulative Review of Cryptography Concepts
Complete the following exercises. Save the document with your last name and submit it to the Assignment Files tab.
1. Review the following packet capture. Describe what the information identified by the yellow arrow in the packet
capture section represents. Describe what is generally transpiring in the communication.
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
2. Review the following packet capture. Describe what the information identified by the yellow arrow in the packet
capture section represents. Describe what is generally transpiring in the communication.
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
3. The following graphic represents a small piece of a larger traffic capture. Based on the information, describe
what this traffic generally represents. Some of the traffic includes the acronym RSA. What is RSA in detail, as
related to the image?
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
4. Review the following graphic and describe its significance to cryptography.
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
5. Describe what is transpiring in the following graphic.
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
6. Describe in detail what the following equation pertains to in cryptography. Include what is being solved and why.
D(PRa, Y)
ANSWER:
7. Describe the process occurring in the following example:
—–BEGIN RSA PRIVATE KEY—-MIIBOgIBAAJBAKkbSUT9/Q2uBfGRau6/XJyZhcF5abo7b37I5hr3EmwGykdzyk8G
SyJK3TOrssl0sdJsGbFmgQaRyV+DLE7750ECAwEAAQJAESwLKa1dCAmW4uvwXuQh
xGk2kuoAWX/1l3tRGoXiYgO4O0/BjHNNwiASF1q6q6nQ89SPKwA1/gpw5lOhMDhA
AQIhANWKs6T6e/FO7MTth4j5KTaPAoq8Xqp/0zGtzJzFD0sBAiEAyrrT4osEDa6t
NrlbdGHmIohnLGu550nVhXg4+8ql3EECIFXcSjUonhM9p8fatedmP6L3R49fBDVL
5jAQcLgMKAUBAiApOnV8zOi2H5/sURfYQ1CaFUNmNUJJVyqlSh3MlxnEAQIhAILN
/Oqz6uYzMmgEtP74B+vuI7yRB35TT1VQbgel6pLC
—–END RSA PRIVATE KEY—–
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
8. Describe the significance of the area in the packet capture noted by the yellow arrow. What is occurring? What
type of system does this communication originate from? Also, why would this system increase the security
posture of an organization?
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.
CMGT/432v5 Introduction to Cryptography
9. This question consists of completing multiple activities.
Activity #1
Complete the steps below:
Step 1: Create a file called secrets.txt and place text of your choice in it (it is better to place a large amount of
text in it).
Step 2: Copy it to your hard disk and take note of its location.
Step 3: Take an image file in .jpg format, placing it in the same directory as the text file just created, renaming it
cool.jpg.
Step 4: Take note that this is merely an example and you must provide the proper paths and spacing.
copy /b cool.jpg + secrets.txt output.jpg
Activity #2
Answer the following questions:

What is this operation an example of?

What could have been used to detect this activity?
ANSWER:
10. Describe the differences between the following terms:
 Stream versus block ciphers
 Asymmetric versus symmetric encryption
 AES versus DES versus 3DES
 IKE versus ISAKMP
 HTTP versus HTTPS
ANSWER:
Copyright © 2016 by University of Phoenix. All rights reserved.

Purchase answer to see full
attachment

Order a plagiarism free paper now. We do not use AI. Use the code SAVE15 to get a 15% Discount

Looking for help with your ASSIGNMENT? Our paper writing service can help you achieve higher grades and meet your deadlines.

Why order from us

We offer plagiarism-free content

We don’t use AI

Confidentiality is guaranteed

We guarantee A+ quality

We offer unlimited revisions

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top