Sunday 3 July 2016

mca5042 smu mca spring 2016 (jul/aug 2016 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5042- Cryptography and Network Security

1 Explain Caesar’s Cipher encryption technique.

Answer: Caesar’s Cipher encryption technique
The Caesar cipher has an important place in history. Julius Caesar is said to have been the first to use this scheme, in which each letter is translated to a letter a fixed number of places after it in the alphabet. Caesar used a



2 Explain data encryption standard (DES).

Answer: The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has been officially accepted as a cryptographic standard both in the United States and abroad.


3 Describe the principles of Public-Key Cryptosystems.

Answer: Public-key cryptography is a radical departure from all that has gone before. Right up to modern times all cryptographic systems have been based on the elementary tools of substitution and permutation. However, public-key algorithms are based on mathematical functions and are asymmetric in

4 Write short notes on
a) Digital signature
b) Attacks on digital signature

Answer: a) Another typical situation parallels a common human need: an order to transfer funds from one person to another. In other words, we want to be able to send electronically the equivalent of a computerized check. We understand how this transaction is handled in the conventional, paper

5 Explain IP security policy

Answer: To start the IP Security Policy Management snap-in
To start the IP Security Policy Management snap-in from the Microsoft Management Console:

Click Start, click Run, type MMC, and then click OK.


6 Write a note on Wireless Transport Layer Security (WTLS).

Answer: Wireless Transport Layer Security (WTLS) is a security protocol, part of the Wireless Application Protocol (WAP) stack. It sits between the WTP and WDP layers in the WAP

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment