Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
PROGRAM
MCA(REVISED
FALL 2012)
SEMESTER
V
SUBJECT
CODE & NAME
MCA5042-
Cryptography and Network Security
1 Explain Caesar’s Cipher
encryption technique.
Answer: Caesar’s
Cipher encryption technique
The Caesar cipher has an important place in history. Julius
Caesar is said to have been the first to use this scheme, in which each letter
is translated to a letter a fixed number of places after it in the alphabet.
Caesar used a
2 Explain data encryption
standard (DES).
Answer: The most widely used
encryption scheme is based on Data Encryption standard. Data Encryption
Standard (DES), a system developed for the U.S. government, was intended for
use by the general public. It has been officially accepted as a cryptographic
standard both in the United States and abroad.
3 Describe the principles
of Public-Key Cryptosystems.
Answer: Public-key cryptography is a radical
departure from all that has gone before. Right up to modern times all
cryptographic systems have been based on the elementary tools of substitution
and permutation. However, public-key algorithms are based on mathematical functions
and are asymmetric in
4 Write short notes on
a) Digital signature
b) Attacks on digital
signature
Answer: a) Another typical situation
parallels a common human need: an order to transfer funds from one person to another.
In other words, we want to be able to send electronically the equivalent of a
computerized check. We understand how this transaction is handled in the
conventional, paper
5 Explain IP security
policy
Answer: To start the IP Security Policy Management
snap-in
To start the IP Security Policy Management snap-in from the
Microsoft Management Console:
Click Start, click Run, type MMC, and then click OK.
6 Write a note on Wireless
Transport Layer Security (WTLS).
Answer: Wireless Transport Layer Security
(WTLS) is a security protocol, part of the Wireless Application Protocol (WAP)
stack. It sits between the WTP and WDP layers in the WAP
Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment