Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent then call us on 08791490301
DRIVE
SPRING
2017
PROGRAM
MCA(REVISED
FALL 2012)
SEMESTER
5
SUBJECT
CODE & NAME
MCA5042-
Cryptography and Network Security
1 a) What is avalanche
effect?
b) Explain data encryption
standard (DES).
Answer: a) In cryptography, the avalanche
effect is the desirable property of cryptographic algorithms, typically block
ciphers and cryptographic hash functions wherein if when an input is changed
slightly (for example, flipping a single bit) the output changes significantly
(e.g., half the output bits flip). In the case of high-quality block ciphers,
such a small change in either the key or the plaintext
2 a) List and explain the
objectives of computer security.
b) What is the difference
between passive and active security threats?
Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is
confidentiality: keeping information away from people who should not have it.
Accomplishing this objective requires that we know what data we are protecting
and who should have access to it. It requires that we provide protection
mechanisms for the data while it is stored in the computer and while it is
being transferred over networks between computers. We will need to know the
application programs that we use (or could use) to manipulate the data and
control the use of
3 Explain the evaluation
criteria for Advanced Encryption Standard (AES).
Answer: The AES is likely to be the
commercial-grade symmetric algorithm of choice for years, if not decades. In
January 1997, NIST called for cryptographers to develop a new encryption
system. As with the call for candidates from which DES was selected, NIST made
several important restrictions. The
4 a) What is key
distribution?
b) Explain symmetric key
distribution using symmetric encryption.
Answer: a) In symmetric key cryptography, both
parties must possess a secret key which they must exchange prior to using any
encryption. Distribution of secret keys has been problematic until recently,
because it involved face-to-face meeting, use of a trusted courier, or sending
the key through an existing
5 a) Describe the four
types of protocol of SSL.
b) What is Transport Layer
Security (TLS)? Explain.
Answer: a) The SSL defines four protocols in
two layers. They are:
Change CipherSpec Protocol
The change CipherSpec protocol is
responsible for sending change CipherSpec messages. At any time, the client can
request to change current cryptographic parameters such as the handshake key
exchange. Following the change CipherSpec notification, the client sends a handshake
key exchange and if available,
6 a) Discuss intrusion
detection.
b) What do you mean by
malicious software? Explain in detail.
Answer: a) Intrusion
detection:
Closely related to audit reduction is the
ability to detect security lapses, ideally while they occur. As we have seen in
the State Department example, there may well be too much information in the
audit log for a human to analyze, but the computer can help correlate
independent data. Intrusion detection software builds patterns of normal system
usage, triggering an alarm any time the usage seems abnormal. After a decade of
promising research results in intrusion detection, products are now
commercially
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent then call us on 08791490301
No comments:
Post a Comment