|
|
Dan Kusnetzky, Program Vice President for System Software at IDC, makes the following illustrative comparison. “If I was trying to get forty tons of gravel from New Jersey across the Hudson river to New York City, I could use one truck and fight traffic and the lines at the toll booth to move it in. Or, I could divide it into 40 1-ton loads, give the drivers radios to communicate, and they can get there faster, because they’re more agile and can find the most efficient route.”
Enterprise Grid Computing, Clay Andres
Linux Magazine, October 2004
rclayton@monmouth.edu
95 ≤ A 90 ≤ A- < 95 86.6 ≤ B+ < 90 83.3 ≤ B < 86.6 80 ≤ B- < 83.3 76.6 ≤ C+ < 80 73.3 ≤ C < 76.6 70 ≤ C- < 73.3 F < 70
A: The answer is right. B: The answer is almost right. C: Nice try.
Q: Public-key cryptography or symmetric cryptography can be used for authentication. Which is the more practical for authentication? Justify your answer.
A: Public-key authenticating is more practical. The identifying secret in public-key cryptography remains secret. Symmetric-key authentication requires distributing the secret to all those requesting authentication.
Q: Public-key cryptography or symmetric cryptography can be used for authentication. Which is the more practical for authentication? Justify your answer.
A: Public-key cryptography is more practical. It is more practical because public key uses a different key for encryption and decryption whereas symmetric key uses the same key for both, making it easier to crack.
Q: Public-key cryptography or symmetric cryptography can be used for authentication. Which is the more practical for authentication? Justify your answer.
A: Public key is less private than symmetric key. The keys are available to the world. Symmetric key uses simple mechanics to encrypt the data. Since authentication requires heavy security (typically), it should be as private as possible.
|
|
www.monmouth.edu/~rclayton/web-pages/f13-514/index.html
tinyurl.com/mucs514f13h
(note the ‘h’).
www.monmouth.edu/~rclayton/web-pages/f13-514/schedule.html
tinyurl.com/mucs514f13s
(note the ‘s’).
This page last modified on 2013 September 1. |