Compare and contrast data encryption standard, Computer Network Security

Assignment Help:

Problem

(a) Using Vigenère cipher and given the key abc, find the ciphertext for the message:

simplicity

Only the 26 lower-case alphabetical characters are used in messages.

(b) Compare and contrast Data Encryption Standard (DES) with Advanced Encryption Standard (AES) with respect to:

(i) their classification
(ii) their encryption/decryption structure and algorithm
(iii) their cryptographic strength
(iv) types of attacks
(v) hardware/software implementation

(c) Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root α = 2.

(i) If user A has public key YA = 9, what is A's private key XA?
(ii) If user B has public key YB = 3, what is the shared secret key K, shared with A?

(d) What are the characteristics of the ‘one-time pad' cryptosystem as compared to Vigenère Cipher.

Give one advantage and two problems with one-time pad cryptosystems.

(e) S/MIME (Secure / Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of e-mail encapsulated in MIME. What are the cryptographic security services for electronic messaging applications provided by S/MIME?


Related Discussions:- Compare and contrast data encryption standard

Categories of controls-information security, Categories of Controls Cont...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

encrypt and decryption using rsa with the prime numbers, Problem (1) -...

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Wireless networks, Wireless Networks The origin of wireless networks a...

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Linux, Discuss the risks of having a single root user

Discuss the risks of having a single root user

Describe benefits of effective communication, Question: (a) Explain the...

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

Point to point transmission(ppp), Normal 0 false false fals...

Normal 0 false false false EN-US X-NONE X-NONE

Identify possible controls-information security, Identify Possible Controls...

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Packet sniffers, PACKET SNIFFERS A packet network protocol analyzer is a...

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd