Need help in allowing symmetric cryptography[2]

 
Thread Tools Search this Thread
Operating Systems Linux Red Hat Need help in allowing symmetric cryptography[2]
# 1  
Old 01-31-2012
Need help in allowing symmetric cryptography[2]

I have encountered some problems in my school work.

Here is the question:

The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography[2].

Much Appreciated!Smilie
# 2  
Old 01-31-2012
Hi,
when you created your account here you accepted the Forum Rules. Rule 6 says no homework in the main forums, but there is a special forum for school work. Make sure you read and understand the special rules to post there.
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Homework & Coursework Questions

Need help in allowing symmetric cryptography[2]

The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. 4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies

2. What is on Your Mind?

How To Analyze This (Cryptography Random?) Permutation...?

Hi to all of you guys, I'm new here... May this thread fits on this section. A friend of mine gave me this enigma to do, written in excel. I attach the file below, name New.xls. Enigma: There are 10^20 possibilities of tables (Table1, Table 2, Table 3, Table 4, Table 5,...), with ten rows (row... (3 Replies)
Discussion started by: lucky7
3 Replies

3. Shell Programming and Scripting

Cryptography

Hi, I have a file which contains 4 columns. I want to encrypt only the first column. The rest of data must be as it is. flat file: 12234333 jakdjf 394839 343874 73746373 5jdkfdj 383993 958939 83473843 lksdjfj 388383 349399 so, 1 should be replace by 4, 2 with 8, 3 with 7..... the... (4 Replies)
Discussion started by: javeed7
4 Replies

4. Cybersecurity

Firewalls and cryptography

As we know, firewall is designed to keep unauthorized outsiders from tampering with a computer system or network. We don't talk about computer security without cryptography. In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a... (1 Reply)
Discussion started by: heroine
1 Replies
Login or Register to Ask a Question