Information Security
In symmetric encryption, why is it important to exchange keys âout of bandâ? 2. Please explain in one paragraph how Public Key Infrastructure (PKI) protects valuable information assets. 3. What is
the difference between âdigital signatureâ and âdigital certificateâ? Question No. 2 1. Discuss how Netscape developed the Secure Socket Layer (SSL) protocol to use public-key encryption to secure
a channel over the public Internet, thus enabling secure communications. 2. Explain how the most common hybrid encryption system is based on the Diffie-Hellman Key Exchange method, which is a
method for exchanging private keys using public-key encryption.