What are two basic functions used in encryption algorithms

Assignment Help Computer Engineering
Reference no: EM132756952

Assignment: Chapter-1

1. What is the OSI security architecture?

2. List and briefly define the three key objectives of computer security.

3. List and briefly define categories of passive and active security attacks.

4. List and briefly define categories of security services.

5. List and briefly define categories of security mechanisms.

6. List and briefly define the fundamental security design principles.

7. Explain the difference between an attack surface and an attack tree.

Chapter-2

1. What does it mean to say that b is a divisor of a?

2. What is the meaning of the expression a divides b?

3. What is the difference between modular arithmetic and ordinary arithmetic?

4. What is a prime number?

5. What is Euler's totient function?

6. The Miller-Rabin test can determine if a number is not prime but cannot determine if a number is prime. How can such an algorithm be used to test for primality?

7. What is a primitive root of a number?

8. What is the difference between an index and a discrete logarithm?

Chapter- 3

1. Describe the main requirements for the secure use of symmetric encryption.

2. What are the two basic functions used in encryption algorithms?

3. Differentiate between secret-key encryption and public-key encryption.

4. What is the difference between a block cipher and a stream cipher?

5. What are the two general approaches to attacking a cipher?

6. List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

7. What is the difference between an unconditionally secure cipher and a computationally secure cipher?

8. Why is the Caesar cipher substitution technique vulnerable to a brute-force cryptanalysis?

9. How much key space is available when a monoalphabetic substitution cipher is used to replace plaintext with ciphertext?

10. What is the drawback of a Playfair cipher?

11. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher?

12. What are two problems with the one-time pad?

13. What is a transposition cipher?

14. What are the drawbacks of Steganography?

Reference no: EM132756952

Questions Cloud

Media analysis project : Choose a specific visual work to analyze for your Media Analysis Project (MAP).
Explain the time preference for money concept : Explain the time preference for money concept. What is insider trading and why is it against the law. What is the SEC and what is it mission
Discuss importance of netiquette : Discuss the importance of netiquette in professional electronic communication.
Which a user of the entity financial statement would : Joint arrangement, a user of the entity's financial statement would most likely find out in the notes that the nature of the joint arrangement is a(an)
What are two basic functions used in encryption algorithms : What are the two basic functions used in encryption algorithms? Differentiate between secret-key encryption and public-key encryption.
Which is group allowed to measure the philippine subsidiary : In the consolidated financial statements, is the group allowed to measure the Philippine subsidiary's property under the cost model?
Target the appropriate professional audience : Target the appropriate professional audience. Use appropriate language for professional audience.
Phenomena of complete validity-fulfillments of wishes : On the contrary, they are psychical [mental] phenomena of complete validity-fulfillments of wishes.
Business analytics : Examine the role of Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a gpa calculator

How to makea gpa calculator using visual basic Create a GPA calculator. Ask the user to input a list of classes and the number of tests per class.

  Design a visual c-sharp program for an ice cream shop

design a Visual C-Sharp program for an Ice Cream Shop. The program will store data about ice cream cones and customers.

  Determine if the number is either valid or invalid

Parse a given text file and determine if the number is either valid or invalid using lex.Integers hexadecimals and decimals are considered valid, everything.

  What are the class and interaction models

What are use case, sequence, and activity diagrams and how are they related to each other? What are the class, state, and interaction models and how are they.

  What is the difference between a password and a passphrase

What is the difference between a password and a passphrase? Why is it necessary to have a passphrase? What does this command do? ssh jupiter date \> .date.

  Make a windows form program for a nina''s cookie source

contain at least one other functional control such as a button (Exit button) or a MenuStrip having an Exit and an About selection.

  Discuss on issues and security vulnerabilities

Need to discuss on issues and security vulnerabilities caused by using 4 digit pin while accessing Banking. 1) Abstract 2) Acknowledgement

  Displays the longest common subsequence found

Your program should create the two dimensional array for the LCS table after getting the strings from the user.

  Describe the decision trees and naive bayes

The decision trees and Naive Bayes. Elaborate on the theories behind these classifiers. Which one of these classifiers are considered computationally efficient.

  Display a palindrome forward then backward

Write a very simple program that uses two for loops and ONLY pointers and pointer arithmetic.

  What are the consequences for non-compliance

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.

  Discuss immigration in general with example

Discuss immigration in general and why people immigrate as well as some of the policies and complexity of immigration. The response must be typed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd