Saturday 2 July 2016

bt0088 smu bsc it spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088 – Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

Answer: Caesar’s Cipher encryption technique
The Caesar cipher has an important place in history. Julius Caesar is said to have been the first to use this scheme, in which each letter is translated to a letter a fixed number of places after it in the alphabet. Caesar used a shift of 3, so that plaintext letter pi was enciphered as ciphertext letter ci by


2 Explain data encryption standard (DES).

Answer: The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad. Moreover, many hardware and software systems have been designed with the DES. The Data Encryption Standard (DES) specifies an algorithm to be implemented in electronic hardware devices and used for the cryptographic protection of computer data ... Encrypting data converts it to an unintelligible form called cipher. Decrypting cipher converts the data back to its original

3 Describe the principles of Public-Key Cryptosystems.

Answer: The cryptosystem contains a set of rules to encrypt the plaintext and to decrypt the ciphertext. The rule used for encryption and decryption are called algorithms, often uses a device called a key, denoted by K. The ciphertext depends on the original plaintext message, the algorithm, and the key


4 Write short notes on the following:
a) Digital signature
b) Attacks on digital signature

Answer: Another typical situation parallels a common human need: an order to transfer funds from one person to another. In other words, we want to be able to send electronically the equivalent of a computerized check. We understand how this transaction is handled in the conventional, paper


5 Explain IP security policy.

Answer: The security policy determines the security services afforded to a packet. As mentioned earlier, all IPSec implementations store the policy in a database called the SPD. The database is indexed by selectors and contains the information on the security services offered to an IP packet. The


6 Write a note on Wireless Transport Layer Security (WTLS).

Answer: The Transport Layer Security protocol is the IETF standard version of the SSL protocol. The two are very similar, with slight differences. The main difference being TLS does not support Fortezza type in both the key exchange and the encryption/decryption algorithms. The generation of

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412


No comments:

Post a Comment