Computer Security and Privacy / COMP–323
Computer Security and Privacy / COMP–323
large KINGDOM OF SAUDI ARABIA | JAZAN UNIVERSITY COLLEGE OF ENGINEERING AND COMPUTER SCIENCE ASSIGNMENT-1 Academic Year Semester First Course with code Computer Security and Privacy / COMP– Section Type of Assignment Theoretical (Home Assignment) Marks 10 Student Name Student ID ASSIGNMENT PROBLEM STATEMENT Answer the following questions. Each question carries an equal mark. (5 x 2 = 10 Marks) [1] What properties must a hash function have to be useful for message authentication? What advantage might elliptic curve cryptography (ECC) have over RSA? Do digital signatures provide confidentiality? [2] Outline the principal categories of security consequences and, for each category, list the threat actions that give rise to them. Briefly describe the main types of outcomes a threat can cause, …

