SlideShare a Scribd company logo
1 of 3
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
SPRING 2016 ASSIGNMENT
PROGRAM BSC IT
SEMESTER FIFTH
SUBJECT CODE & NAME BT0088- Cryptography and Network Security
CREDITS 4
BK ID B2069
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Question. 1. Explain Caesar’s Cipher encryption technique.
Answer:In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's
code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a
type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed
numberof positionsdownthe alphabet. For example, with a left shift of 3, D would be replaced by
A,E wouldbecome B,andso on. The methodisnamedafterJuliusCaesar,who used it in his private
correspondence.
Question. 2. Explain data encryption standard (DES).
Answer:DESworks byusingthe same keyto encryptand decrypta message,so both the sender and
the receivermustknowanduse the same private key. Once the go-to, symmetric-key algorithm for
the encryption of electronic data, DES has been superseded by the more secure Advanced
Encryption Standard (AES) algorithm.
Originally designed by researchers at IBM in the early 1970s, DES was adopted by the U.S.
government as an official Federal Information
Question. 3. Describe the principles of Public-Key Cryptosystems.
Answer:Public-key cryptography refers to a set of cryptographic algorithms that are based on
mathematical problems that currently admit no efficient solution -- particularly those inherent in
certainintegerfactorization,discretelogarithm, andellipticcurve relationships.Itiscomputationally
easyfor a userto generate apublicand private key-pairandtouse it for encryption and decryption.
The strength lies in the "impossibility" (computational impracticality) for a properly generated
private key to be determined from its corresponding public key. Thus the public key may be
published without compromising security. Security depends
Question. 4.Write short notes on
a) Digital signature
Answer:A digital signature isamathematical scheme fordemonstrating the authenticity of a digital
message ordocuments.A validdigital signaturegivesarecipientreasontobelieve that the message
was created by a known sender, that the sender cannot deny having sent the message
(authentication and non-repudiation), and that the message was not altered in transit (integrity).
Digital signaturesare commonlyused for software distribution, financial transactions, and in other
cases where it is important to detect forgery or tampering.
Question. 5. Describe Kerberos.
Answer:Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the
basisof 'tickets'to allownodescommunicatingoveranon-secure networktoprove their identity to
one anotherina secure manner.The protocol wasnamedafter the character Kerberos(orCerberus)
from Greek mythology, the ferocious three-headed guard dog of Hades (hellhound). Its designers
aimeditprimarilyata client–servermodelanditprovidesmutual authentication—boththe userand
the server verify each other's identity. Kerberos protocol messages are protected against
eavesdropping and replay attacks. Kerberos
Question. 6. Explain Security Socket Layer (SSL).
Answer:The Secure Sockets Layer (SSL) is a computer networking protocol that manages server
authentication,clientauthenticationandencryptedcommunicationbetweenserversandclients.SSL
usesa combinationof public-keyandsymmetric-keyencryptiontosecure aconnectionbetweentwo
machines,typicallya Web or mail server and a client machine, communicating over the Internet or
an internal network.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

More Related Content

What's hot

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
Lê Liêu
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 

What's hot (17)

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 
Secure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted SignaturesSecure Obfuscation for Encrypted Signatures
Secure Obfuscation for Encrypted Signatures
 
57 306-311
57 306-31157 306-311
57 306-311
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Viewers also liked

Viewers also liked (20)

Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
 
Mb0047 management information system
Mb0047   management information systemMb0047   management information system
Mb0047 management information system
 
Mb0050 research methodology
Mb0050   research methodologyMb0050   research methodology
Mb0050 research methodology
 
Mh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resourcesMh0057 – management of healthcare human resources
Mh0057 – management of healthcare human resources
 
Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)Bt8901 object oriented systems-de (1)
Bt8901 object oriented systems-de (1)
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
 
Mf0015 international financial management
Mf0015   international financial managementMf0015   international financial management
Mf0015 international financial management
 
Mh0056 public relations & marketing for healthcare organizations
Mh0056   public relations & marketing for healthcare organizationsMh0056   public relations & marketing for healthcare organizations
Mh0056 public relations & marketing for healthcare organizations
 
Mb0045 financial management
Mb0045   financial managementMb0045   financial management
Mb0045 financial management
 
Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)Bt9002 grid computing-de (1)
Bt9002 grid computing-de (1)
 
Mf0018 insurance and risk management
Mf0018   insurance and risk managementMf0018   insurance and risk management
Mf0018 insurance and risk management
 
Bb0029 economic reforms process in india
Bb0029   economic reforms process in indiaBb0029   economic reforms process in india
Bb0029 economic reforms process in india
 
Mh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare servicesMh0059 – quality management in healthcare services
Mh0059 – quality management in healthcare services
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-de
 
Bt8902 e-commerce-de
Bt8902 e-commerce-deBt8902 e-commerce-de
Bt8902 e-commerce-de
 
Mb0044 production and operation management
Mb0044   production and operation managementMb0044   production and operation management
Mb0044 production and operation management
 
Mb0048 operations research (1)
Mb0048 operations research (1)Mb0048 operations research (1)
Mb0048 operations research (1)
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
 
Mb0049 project management
Mb0049   project managementMb0049   project management
Mb0049 project management
 
Mca4010 microprocessor
Mca4010  microprocessorMca4010  microprocessor
Mca4010 microprocessor
 

Similar to Bt0088 cryptography and network security

Info tec Information Systems homework help.docx
Info tec Information Systems homework help.docxInfo tec Information Systems homework help.docx
Info tec Information Systems homework help.docx
write4
 
Answer die following questions with short answers Explain the d.pdf
Answer die following questions with short answers  Explain the d.pdfAnswer die following questions with short answers  Explain the d.pdf
Answer die following questions with short answers Explain the d.pdf
calderoncasto9163
 

Similar to Bt0088 cryptography and network security (20)

Criptography
CriptographyCriptography
Criptography
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Info tec Information Systems homework help.docx
Info tec Information Systems homework help.docxInfo tec Information Systems homework help.docx
Info tec Information Systems homework help.docx
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Answer die following questions with short answers Explain the d.pdf
Answer die following questions with short answers  Explain the d.pdfAnswer die following questions with short answers  Explain the d.pdf
Answer die following questions with short answers Explain the d.pdf
 
Cryptography
Cryptography Cryptography
Cryptography
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Mit4022 network security
Mit4022  network securityMit4022  network security
Mit4022 network security
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Cryptography
CryptographyCryptography
Cryptography
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
e commerce.pptx
e commerce.pptxe commerce.pptx
e commerce.pptx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 

Bt0088 cryptography and network security

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 SPRING 2016 ASSIGNMENT PROGRAM BSC IT SEMESTER FIFTH SUBJECT CODE & NAME BT0088- Cryptography and Network Security CREDITS 4 BK ID B2069 MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Question. 1. Explain Caesar’s Cipher encryption technique. Answer:In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed numberof positionsdownthe alphabet. For example, with a left shift of 3, D would be replaced by A,E wouldbecome B,andso on. The methodisnamedafterJuliusCaesar,who used it in his private correspondence. Question. 2. Explain data encryption standard (DES). Answer:DESworks byusingthe same keyto encryptand decrypta message,so both the sender and the receivermustknowanduse the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm. Originally designed by researchers at IBM in the early 1970s, DES was adopted by the U.S. government as an official Federal Information Question. 3. Describe the principles of Public-Key Cryptosystems.
  • 2. Answer:Public-key cryptography refers to a set of cryptographic algorithms that are based on mathematical problems that currently admit no efficient solution -- particularly those inherent in certainintegerfactorization,discretelogarithm, andellipticcurve relationships.Itiscomputationally easyfor a userto generate apublicand private key-pairandtouse it for encryption and decryption. The strength lies in the "impossibility" (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security. Security depends Question. 4.Write short notes on a) Digital signature Answer:A digital signature isamathematical scheme fordemonstrating the authenticity of a digital message ordocuments.A validdigital signaturegivesarecipientreasontobelieve that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity). Digital signaturesare commonlyused for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. Question. 5. Describe Kerberos. Answer:Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the basisof 'tickets'to allownodescommunicatingoveranon-secure networktoprove their identity to one anotherina secure manner.The protocol wasnamedafter the character Kerberos(orCerberus) from Greek mythology, the ferocious three-headed guard dog of Hades (hellhound). Its designers aimeditprimarilyata client–servermodelanditprovidesmutual authentication—boththe userand the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos Question. 6. Explain Security Socket Layer (SSL). Answer:The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication,clientauthenticationandencryptedcommunicationbetweenserversandclients.SSL usesa combinationof public-keyandsymmetric-keyencryptiontosecure aconnectionbetweentwo machines,typicallya Web or mail server and a client machine, communicating over the Internet or an internal network. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or
  • 3. Call us at : 08263069601