SlideShare a Scribd company logo
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
SPRING 2016 ASSIGNMENT
PROGRAM BSC IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT0088- Cryptography and Network Security
CREDITS 4
BK ID B2069
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Question. 1. Explain Caesar’s Cipher encryption technique.
Answer:In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's
code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a
type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed
numberof positionsdownthe alphabet. For example, with a left shift of 3, D would be replaced by
A,E wouldbecome B,andso on. The methodisnamedafterJuliusCaesar,who used it in his private
correspondence.
Question. 2. Explain data encryption standard (DES).
Answer:DESworks byusingthe same keyto encryptand decrypta message,so both the sender and
the receivermustknowanduse the same private key. Once the go-to, symmetric-key algorithm for
the encryption of electronic data, DES has been superseded by the more secure Advanced
Encryption Standard (AES) algorithm.
Originally designed by researchers at IBM in the early 1970s, DES was adopted by the U.S.
government as an official Federal Information
Question. 3. Describe the principles of Public-Key Cryptosystems.
Answer:Public-key cryptography refers to a set of cryptographic algorithms that are based on
mathematical problems that currently admit no efficient solution -- particularly those inherent in
certainintegerfactorization,discretelogarithm, andellipticcurve relationships.Itiscomputationally
easyfor a userto generate apublicand private key-pairandtouse it for encryption and decryption.
The strength lies in the "impossibility" (computational impracticality) for a properly generated
private key to be determined from its corresponding public key. Thus the public key may be
published without compromising security. Security depends
Question. 4.Write short notes on
a) Digital signature
Answer:A digital signature isamathematical scheme fordemonstrating the authenticity of a digital
message ordocuments.A validdigital signaturegivesarecipientreasontobelieve that the message
was created by a known sender, that the sender cannot deny having sent the message
(authentication and non-repudiation), and that the message was not altered in transit (integrity).
Digital signaturesare commonlyused for software distribution, financial transactions, and in other
cases where it is important to detect forgery or tampering.
Question. 5. Describe Kerberos.
Answer:Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the
basisof 'tickets'to allownodescommunicatingoveranon-secure networktoprove their identity to
one anotherina secure manner.The protocol wasnamedafter the character Kerberos(orCerberus)
from Greek mythology, the ferocious three-headed guard dog of Hades (hellhound). Its designers
aimeditprimarilyata client–servermodelanditprovidesmutual authentication—boththe userand
the server verify each other's identity. Kerberos protocol messages are protected against
eavesdropping and replay attacks. Kerberos
Question. 6. Explain Security Socket Layer (SSL).
Answer:The Secure Sockets Layer (SSL) is a computer networking protocol that manages server
authentication,clientauthenticationandencryptedcommunicationbetweenserversandclients.SSL
usesa combinationof public-keyandsymmetric-keyencryptiontosecure aconnectionbetweentwo
machines,typicallya Web or mail server and a client machine, communicating over the Internet or
an internal network.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

More Related Content

What's hot

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
Joon Young Park
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Bitcoin Association of Australia
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
Kishankant Yadav
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocolsLê Liêu
 
Secure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted SignaturesSecure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted Signatures
Satoshi Hada
 
57 306-311
57 306-31157 306-311
57 306-311
idescitation
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
Shakas Technologies
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
DSC Delhi
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
Karan Jaiswal
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
Michele Orru'
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
ieeepondy
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
GakwayaNJoel
 

What's hot (17)

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 
Secure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted SignaturesSecure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted Signatures
 
57 306-311
57 306-31157 306-311
57 306-311
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Viewers also liked

Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
smumbahelp
 
Mb0047 management information system
Mb0047   management information systemMb0047   management information system
Mb0047 management information system
smumbahelp
 
Mb0050 research methodology
Mb0050   research methodologyMb0050   research methodology
Mb0050 research methodology
smumbahelp
 
Mh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resourcesMh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resources
smumbahelp
 
Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)
smumbahelp
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
smumbahelp
 
Mf0015 international financial management
Mf0015   international financial managementMf0015   international financial management
Mf0015 international financial management
smumbahelp
 
Mh0056 public relations & marketing for healthcare organizations
Mh0056   public relations & marketing for healthcare organizationsMh0056   public relations & marketing for healthcare organizations
Mh0056 public relations & marketing for healthcare organizations
smumbahelp
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
smumbahelp
 
Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)
smumbahelp
 
Mf0018 insurance and risk management
Mf0018   insurance and risk managementMf0018   insurance and risk management
Mf0018 insurance and risk management
smumbahelp
 
Bb0029 economic reforms process in india
Bb0029   economic reforms process in indiaBb0029   economic reforms process in india
Bb0029 economic reforms process in india
smumbahelp
 
Mh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare servicesMh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare services
smumbahelp
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-de
smumbahelp
 
Bt8902 e-commerce-de
Bt8902 e-commerce-deBt8902 e-commerce-de
Bt8902 e-commerce-de
smumbahelp
 
Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
smumbahelp
 
Mb0048 operations research (1)
Mb0048 operations research (1)Mb0048 operations research (1)
Mb0048 operations research (1)
smumbahelp
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
smumbahelp
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
smumbahelp
 
Mca4010 microprocessor
Mca4010  microprocessorMca4010  microprocessor
Mca4010 microprocessor
smumbahelp
 

Viewers also liked (20)

Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
 
Mb0047 management information system
Mb0047   management information systemMb0047   management information system
Mb0047 management information system
 
Mb0050 research methodology
Mb0050   research methodologyMb0050   research methodology
Mb0050 research methodology
 
Mh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resourcesMh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resources
 
Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
 
Mf0015 international financial management
Mf0015   international financial managementMf0015   international financial management
Mf0015 international financial management
 
Mh0056 public relations & marketing for healthcare organizations
Mh0056   public relations & marketing for healthcare organizationsMh0056   public relations & marketing for healthcare organizations
Mh0056 public relations & marketing for healthcare organizations
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
 
Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)
 
Mf0018 insurance and risk management
Mf0018   insurance and risk managementMf0018   insurance and risk management
Mf0018 insurance and risk management
 
Bb0029 economic reforms process in india
Bb0029   economic reforms process in indiaBb0029   economic reforms process in india
Bb0029 economic reforms process in india
 
Mh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare servicesMh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare services
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-de
 
Bt8902 e-commerce-de
Bt8902 e-commerce-deBt8902 e-commerce-de
Bt8902 e-commerce-de
 
Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
 
Mb0048 operations research (1)
Mb0048 operations research (1)Mb0048 operations research (1)
Mb0048 operations research (1)
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
 
Mca4010 microprocessor
Mca4010  microprocessorMca4010  microprocessor
Mca4010 microprocessor
 

Similar to Bt0088 cryptography and network security

Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
smumbahelp
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
smumbahelp
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
Mike Gates
 
Info tec Information Systems homework help.docx
Info tec Information Systems homework help.docxInfo tec Information Systems homework help.docx
Info tec Information Systems homework help.docx
write4
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
research30
 
Answer die following questions with short answers Explain the d.pdf
Answer die following questions with short answers  Explain the d.pdfAnswer die following questions with short answers  Explain the d.pdf
Answer die following questions with short answers Explain the d.pdf
calderoncasto9163
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
Skyriver04
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
CheapSSLUSA
 
Mit4022 network security
Mit4022  network securityMit4022  network security
Mit4022 network security
smumbahelp
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
 
J017667582
J017667582J017667582
J017667582
IOSR Journals
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
Sanjeev Kumar Jaiswal
 
Cryptography
CryptographyCryptography
Cryptography
Izzatbek001
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
FRSecure
 
e commerce.pptx
e commerce.pptxe commerce.pptx
e commerce.pptx
lakshayparashar5
 

Similar to Bt0088 cryptography and network security (20)

Criptography
CriptographyCriptography
Criptography
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Info tec Information Systems homework help.docx
Info tec Information Systems homework help.docxInfo tec Information Systems homework help.docx
Info tec Information Systems homework help.docx
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Answer die following questions with short answers Explain the d.pdf
Answer die following questions with short answers  Explain the d.pdfAnswer die following questions with short answers  Explain the d.pdf
Answer die following questions with short answers Explain the d.pdf
 
Cryptography
Cryptography Cryptography
Cryptography
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Mit4022 network security
Mit4022  network securityMit4022  network security
Mit4022 network security
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Cryptography
CryptographyCryptography
Cryptography
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
e commerce.pptx
e commerce.pptxe commerce.pptx
e commerce.pptx
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Bt0088 cryptography and network security

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 SPRING 2016 ASSIGNMENT PROGRAM BSC IT SEMESTER FIFTH SUBJECT CODE & NAME BT0088- Cryptography and Network Security CREDITS 4 BK ID B2069 MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Question. 1. Explain Caesar’s Cipher encryption technique. Answer:In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed numberof positionsdownthe alphabet. For example, with a left shift of 3, D would be replaced by A,E wouldbecome B,andso on. The methodisnamedafterJuliusCaesar,who used it in his private correspondence. Question. 2. Explain data encryption standard (DES). Answer:DESworks byusingthe same keyto encryptand decrypta message,so both the sender and the receivermustknowanduse the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm. Originally designed by researchers at IBM in the early 1970s, DES was adopted by the U.S. government as an official Federal Information Question. 3. Describe the principles of Public-Key Cryptosystems.
  • 2. Answer:Public-key cryptography refers to a set of cryptographic algorithms that are based on mathematical problems that currently admit no efficient solution -- particularly those inherent in certainintegerfactorization,discretelogarithm, andellipticcurve relationships.Itiscomputationally easyfor a userto generate apublicand private key-pairandtouse it for encryption and decryption. The strength lies in the "impossibility" (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security. Security depends Question. 4.Write short notes on a) Digital signature Answer:A digital signature isamathematical scheme fordemonstrating the authenticity of a digital message ordocuments.A validdigital signaturegivesarecipientreasontobelieve that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity). Digital signaturesare commonlyused for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. Question. 5. Describe Kerberos. Answer:Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the basisof 'tickets'to allownodescommunicatingoveranon-secure networktoprove their identity to one anotherina secure manner.The protocol wasnamedafter the character Kerberos(orCerberus) from Greek mythology, the ferocious three-headed guard dog of Hades (hellhound). Its designers aimeditprimarilyata client–servermodelanditprovidesmutual authentication—boththe userand the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos Question. 6. Explain Security Socket Layer (SSL). Answer:The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication,clientauthenticationandencryptedcommunicationbetweenserversandclients.SSL usesa combinationof public-keyandsymmetric-keyencryptiontosecure aconnectionbetweentwo machines,typicallya Web or mail server and a client machine, communicating over the Internet or an internal network. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or
  • 3. Call us at : 08263069601