Saturday, October 5, 2019
Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words
Class student dicussions answers - Assignment Example Pavitor, you could have added a definition and elaborated a bit more of asymmetric cryptography in order to make it easier to differentiate the two concepts. I agree with you Jusin G that symmetric key distribution can pose to bring lots of insecure communication or message interception between the involved organizations. Asymmetric cryptography is also known as public key cryptography. It makes use of two keys, a private key to decrypt messages and a public key to encrypt messages. I agree with you Jusin G that the asymmetric cryptography can be adopted by two organizations which want to send sensitive messages more securely. This is because; the asymmetric cryptography avoids the drawback of exchanging the key by distribution of the public key in a non-secure mechanism while at the same time, the private key is not transmitted. Thanks Pavitor For the good analysis of the different technologies. But I rather disagree with you that WEP is secure. Let me say that WEP is an older technology in wireless networks. This makes it easily hacked and cannot guarantee security within oneââ¬â¢s business premise. You gave the advantage that users shun the network ones it prompts for wireless security key, this is not always the case but depends on an individualââ¬â¢s motif. User may be determined to think of more other ways of getting into the network. I agree with you about interoperability, it is a great feature provided by the WEP. WPA and WPA2 form part of the recommended solutions to WEP security issues. I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of passing data across a wireless network than WEP. Also to note is that WPA2 was as a result of implementation of 802.11i. Good analysis of the encryption for wireless networks you Pavitor. I disagree with you Jusin G
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.