Thursday 7 April 2016

bt0088 smu b.sc it winter 2015 (april/may 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

Bt0088
Winter 2015

1 List and explain the three objectives of computer security.

Answer: Key Objectives of Computer Security are:
Confidentiality
·         Data confidentiality assures that private or confidential information is not made available or disclosed to unauthorized individuals
·         Privacy assures that individuals control or influence what information related to them may be collected and stored and by


2 Write a note on:
(i) Plaintext
(ii) Ciphertext
(iii) Encryption
(iv) Decryption
(v) Cryptology

Answer: i) plaintext
The analyst may be fortunate enough to have a sample message and its decipherment. For example, a diplomatic


3 Briefly explain evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call for candidates from which DES was selected, NIST made several important restrictions. The algorithms had to be
·         publicly

4 What is cryptographic hash function? Explain. What is birthday attack?

Answer: Cryptographic Hash Functions
An encryption basically means sending a secret message. Generally we encrypt a message so that the content is known to only to the intended persons. Similarly while we send a message integrity is as well as important as secrecy. For example, in a document retrieval system containing legal records, it may be important to know that the copy retrieved is exactly what was stored. Likewise, in a secure



5 Explain symmetric key distribution using symmetric encryption.

Answer: To use symmetric encryption, the sender and receiver must have previously established a shared secret encryption key. The processing type ("Proc-Type") field tells what privacy



6 What is World Wide Web? What are the requirements of web security?

Answer: The World Wide Web (WWW) is an open source information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. The World Wide Web was invented by English scientist Tim Berners-Lee in 1989.


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


No comments:

Post a Comment