April
1999 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
Click to access
|
| (a) | Describe the application of digital
signatures as a means for authentication.
|
[4] |
| (b) | Describe two characteristics which are
common to digital and written signatures.
|
[4] |
| (c) | Describe two benefits of using one-way
hash functions in signing documents with public key cryptography.
|
[4] |
| (d) | Distinguish between symmetric and asymmetric
key protocols.
|
[4] |
| (e) | Explain how authentication and secret transmission using the same algorithm could cause a security problem. | [4] |