Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
Bt0088
Fall
2015
1 Explain
Caesar’s Cipher encryption technique
Answer: Caesar’s Cipher encryption technique
The Caesar cipher has an important place
in history. Julius Caesar is said to have been the first to use this scheme, in
which each letter is translated to a letter a fixed number of places after it
in the alphabet. Caesar used a shift of 3, so that plaintext letter pi was
enciphered as ciphertext letter ci by the rule
2 Explain data
encryption standard (DES)
Answer: The most widely used
encryption scheme is based on Data Encryption standard. Data Encryption
Standard (DES), a system developed for the U.S. government, was intended for
use by the general public. It has been officially accepted as a cryptographic
standard both in the United States and abroad
3 Describe the
principles of Public-Key Cryptosystems.
Answer: Public-key cryptography
refers to a set of cryptographic algorithms that are based on mathematical
problems that currently admit no efficient solution -- particularly those
inherent in certain integer factorization, discrete logarithm, and elliptic
curve relationships. It is computationally easy for a user to generate a public
and private key-pair and to use it for encryption and decryption. The strength
lies in the "impossibility" (computational impracticality) for a
properly generated private key to be determined from its corresponding public
key. Thus
4 Write short
notes on
a) Digital
signature
b) Attacks on
digital signature
Answer: a) Digital signatures are
often used to implement electronic signatures, a broader term that refers to
any electronic data that carries the intent of a signature, but not all
electronic signatures use digital signatures. In some countries, including the
United States, India, Brazil, Saudi Arabia, the
5 Describe Kerberos.
Answer: Kerberos is a network
authentication protocol. It is designed to provide strong authentication for
client/server applications by using secret-key cryptography. A free
implementation of this protocol is available from the Massachusetts Institute
of Technology. Kerberos is available in many commercial products as well.
The Internet is an insecure
6 Explain
Security Socket Layer (SSL).
Answer: SSL (Secure Sockets Layer)
is a standard security technology for establishing an encrypted link between a
server and a client—typically a web server (website) and a browser; or a mail
server and a mail client (e.g., Outlook).
SSL allows sensitive information such as
credit card numbers, social security numbers, and login credentials to be
transmitted
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment