Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
PROGRAM
BSc
IT
SEMESTER
FIFTH
SUBJECT
CODE & NAME
BT0088
– Cryptography and Network Security
1 Explain Caesar’s Cipher
encryption technique.
Answer: Caesar’s
Cipher encryption technique
The Caesar cipher has an important place
in history. Julius Caesar is said to have been the first to use this scheme, in
which each letter is translated to a letter a fixed number of places after it
in the alphabet. Caesar used
2 Explain data encryption standard
(DES).
Answer: The most widely used encryption scheme
is based on Data Encryption standard. Data Encryption Standard (DES), a system
developed for the U.S. government, was intended for use by the general public.
It has been officially accepted as a cryptographic standard both in the United
States and
3 Describe the principles
of Public-Key Cryptosystems.
Answer: The cryptosystem contains a set of
rules to encrypt the plaintext and to decrypt the ciphertext. The rule used for
encryption and decryption are called algorithms, often uses a device called a
key, denoted by K. The ciphertext depends on the original plaintext message,
the algorithm, and the key value. So, it is written
4 Write short notes on the
following:
a) Digital signature
b) Attacks on digital
signature
Answer: Another typical situation parallels a common human need: an order to transfer
funds from one person to another. In other words, we want to be able to send
electronically the equivalent of a computerized check. We
5
Explain IP security policy.
Answer: The security policy determines the security services afforded to a
packet. As mentioned earlier, all IPSec implementations store the policy in a
database called the SPD. The database is indexed by selectors and contains the information
on the security services offered to an IP packet. The security policy is
consulted for both inbound and outbound processing of the IP packets. On
inbound or outbound packet processing, the SPD is consulted to determine the
services afforded to the packet. A separate
6 Write a note on Wireless
Transport Layer Security (WTLS).
Answer: The Transport Layer Security protocol is the IETF standard version of
the SSL protocol. The two are very similar, with slight differences. The main difference
being TLS does not support Fortezza type in both the key exchange and the
encryption/decryption algorithms. The generation of cryptographic
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject
if urgent then
call us on 08791490301, 08273413412
No comments:
Post a Comment