Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us
on 08791490301, 08273413412
Bt0088
Winter
2015
1 List and explain the
three objectives of computer security.
Answer: Key Objectives of Computer Security are:
Confidentiality
·
Data confidentiality
assures that private or confidential information is not made available or
disclosed to unauthorized individuals
·
Privacy assures that
individuals control or influence what information related to them may be
collected and stored and by
2
Write a note on:
(i) Plaintext
(ii) Ciphertext
(iii) Encryption
(iv) Decryption
(v) Cryptology
Answer: i) plaintext
The analyst may be fortunate enough to
have a sample message and its decipherment. For example, a diplomatic
3 Briefly explain
evaluation criteria for Advanced Encryption Standard (AES).
Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice
for years, if not decades. In January 1997, NIST called for cryptographers to
develop a new encryption system. As with the call for candidates from which DES
was selected, NIST made several important restrictions. The algorithms had to be
·
publicly
4 What is cryptographic
hash function? Explain. What is birthday attack?
Answer: Cryptographic Hash Functions
An encryption basically means sending a secret
message. Generally we encrypt a message so that the content is known to only to
the intended persons. Similarly while we send a message integrity is as well as
important as secrecy. For example, in a document retrieval system containing
legal records, it may be important to know that the copy retrieved is exactly
what was stored. Likewise, in a secure
5 Explain symmetric key
distribution using symmetric encryption.
Answer: To use symmetric encryption, the sender and receiver must have
previously established a shared secret encryption key. The processing type
("Proc-Type") field tells what privacy
6 What is World Wide Web?
What are the requirements of web security?
Answer: The World Wide Web (WWW) is an open
source information space where documents and other web resources are identified
by URLs, interlinked by hypertext links, and can be accessed via the Internet.
The World Wide Web was invented by English scientist Tim Berners-Lee in 1989.
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us
on 08791490301, 08273413412
No comments:
Post a Comment