December
1998 QUESTION 2 Total Marks: 20 Marks |
Click here to access other
questions
Click to access
|
(a) | Explain with the use of an example, the terms encryption
and decryption.
|
[4] |
(b) | Describe how the public key
protocol is used in authenticating communicating entities.
|
[4] |
(c) | Describe two possible attacks on remote
communications.
|
[4] |
(d) | Describe two
characteristics which are common to digital and written signatures.
|
[4] |
(e) | Explain how digital signatures can be useful as a means for authentication on communication networks. | [4] |