Sunday, 12 June 2016

mit4022 smu msc it spring 2016 (jul/aug 2016 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

MIT4022
SPRING 2016



1 List and explain the types of Security Attacks in Network.

Answer: When you test any computer system, one of your jobs is to imagine how the system could malfunction. Then, you improve the system's design so that the system can withstand any of the problems you have identified. In the same way, we analyze a system from a security perspective,


2 Explain Feistel Cipher.

Answer: Feistel Cipher is not a specific scheme of block cipher. It is a design model from which many different block ciphers are derived. DES is just one example of a Feistel Cipher. A cryptographic system based on Feistel cipher structure uses the same algorithm for both encryption

3 Explain the following.
(a) Asymmetric Keys
(b) Public Key Certificate
(c) Public Key (Asymmetric) Cryptographic Algorithm
(d) Public Key Infrastructure (PKI)

Answer: a) Asymmetric cryptography or public-key cryptography is cryptography in which a pair of keys


4 (a) Explain digital signature
(b) Explain the different types of attacks on digital signatures.

Answer: a) A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (


5 Explain the benefits of IP security.

Answer: Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec is a suite of cryptography-based protection services and security protocols


6 Define the following terms used in the IEEE 802.11 standard.
(a) Access Point (AP)
(b) Basic Service Set (BSS)
(c) Coordination function
(d) Distribution System (DS)
(e) Extended Service Set (ESS)

Answer: a) Inter-Access Point Protocol is a recommendation that describes an optional extension to IEEE 802.11 that provides wireless access point communications among multivendor systems.[1] 802.11 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 802.11a, 802.11b, 802.11g and 802.11n versions to provide wireless connectivity in the home, office and some commercial


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment