Infromation Security

Infromation Security
Question No. 1 1. In symmetric encryption, why is it important to exchange keys “out of band”? 2. Please explain in one paragraph how Public Key Infrastructure (PKI)
protects valuable information assets. 3. What is the difference between “digital signature” and “digital certificate”? Question No. 2 1. Discuss how Netscape developed
the Secure Socket Layer (SSL) protocol to use public-key encryption to secure a channel over the public Internet, thus enabling secure communications. 2. Explain how
the most common hybrid encryption system is based on the Diffie-Hellman Key Exchange method, which is a method for exchanging private keys using public-key encryption.