Saturday, 10 June 2017

mca5042 smu mca spring 2017 (jul/aug 2017 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301

DRIVE
SPRING 2017
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
5
SUBJECT CODE & NAME
MCA5042- Cryptography and Network Security


1 a) What is avalanche effect?
b) Explain data encryption standard (DES).

Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext


2 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?

Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. It requires that we provide protection mechanisms for the data while it is stored in the computer and while it is being transferred over networks between computers. We will need to know the application programs that we use (or could use) to manipulate the data and control the use of

3 Explain the evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if not decades. In January 1997, NIST called for cryptographers to develop a new encryption system. As with the call for candidates from which DES was selected, NIST made several important restrictions. The


4 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.

Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing


5 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.

Answer: a) The SSL defines four protocols in two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any time, the client can request to change current cryptographic parameters such as the handshake key exchange. Following the change CipherSpec notification, the client sends a handshake key exchange and if available,


6 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.

Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As we have seen in the State Department example, there may well be too much information in the audit log for a human to analyze, but the computer can help correlate independent data. Intrusion detection software builds patterns of normal system usage, triggering an alarm any time the usage seems abnormal. After a decade of promising research results in intrusion detection, products are now commercially



Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301



No comments:

Post a Comment