December 1998
SC223: COMPUTER SECURITY

QUESTION 2

Total Marks: 20 Marks

Click here to access other questions

Click to access
SUGGESTED SOLUTIONS
for Question 2

 

(a) Explain with the use of an example, the terms encryption and decryption.

 

[4]
(b) Describe how the public key protocol is used in authenticating communicating entities.

 

[4]
(c) Describe two possible attacks on remote communications.

 

[4]
(d) Describe two characteristics which are common to digital and written signatures.

 

[4]
(e) Explain how digital signatures can be useful as a means for authentication on communication networks. [4]