• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

6b - Cryptography Public Key Encryption and Digital Signatures

Wrap Up

June 5, 2024 by David Lanter

Lecture presentation

Quiz and solutions

Filed Under: 6b - Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 1

April 29, 2024 by David Lanter 30 Comments

The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year.  Today a symmetric session key needs to be 100 bits long to be considered strong.  How long will a symmetric session key have to be in 30 years to be considered strong? (Hint: Consider how much longer decryption takes if the key length is increased by a single bit.) Explain.

Filed Under: 6b - Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 2

April 29, 2024 by David Lanter 30 Comments

Longer keys are more difficult to crack. Most symmetric keys today are 100 to 300 bits long. Why don’t systems use far longer symmetric keys—say, 1,000 bit keys?

 

Filed Under: 6b - Cryptography Public Key Encryption and Digital Signatures Tagged With:

Question 3

April 29, 2024 by David Lanter 30 Comments

How are digital certificates and drivers’ licenses similar, and how are they different?

Filed Under: 6b - Cryptography Public Key Encryption and Digital Signatures Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in