Reference no: EM133323
QUESTION 1:
(a) What are the indispensable ingredients of a symmetric cipher?
(b) What are the two basic meanings used in symmetric encryption algorithms?
(c)How many keys are needed for two people to communicate via a cipher?
(d) What is the disparity between a block cipher and a stream cipher?
(e) What are the two approaches to attacking a cipher?
(f) What is the disparity between an unconditionally secure cipher and a computationally secure cipher?
(g) Briefly express the Caesar cipher?
QUESTION 2:
(a) What is the dissimilarity between diffusion and confusion?
(b) Which parameters and design choices determine the actual algorithm of a feistel cipher?
(c) Put in plain words the avalanche effect.
(d) File the types of cryptanalytic attacks.
(e) What is the disparity between a mono alphabetic cipher and a poly alphabetic cipher?
QUESTION 3
(a) Briefly illustrate
i. Mix Columns.
ii. Add Round key.
(b) Confer the Key Expansion Algorithm.
(c) Elucidate in detail how you can do triple encryption with only 2 keys.
QUESTION 4
(a) Why is it not enviable to reuse a stream cipher key?
(b) Evaluate and contrast link and end-to-end encryption?
(c) What is traffic padding and what is its motive?
(d) What are the overhauls provided by PGP services?
Access control list
: DNS Cache Poisoning attack, Turtle Shell Architecture,
|
Why might a best fit approach be more helpful
: What are the severe limitations of the best practice approach What is meant by the best fit approach to the design and development of a human resource strategy Why might a best fit approach be more helpful
|
Define service recovery
: Define service recovery Discuss the impact of the service recovery efforts on customer loyalty
|
Turtle shell architecture
: Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function
|
Symmetric encryption algorithms
: block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption
|
Discretionary and mandatory access control
: Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks
|
Network security
: SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..
|
Digital forensic investigation
: computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html
|
Computer security incident
: Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers
|