Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
[ WINTER, 2015 ] ASSIGNMENT
PROGRAM
|
MCA(REVISED FALL 2012)
|
SEMESTER
|
V
|
SUBJECT CODE & NAME
|
MCA5042- Cryptography and Network
Security
|
CREDIT
|
4
|
BK ID
|
B2069
|
MAX. MARKS
|
60
|
Answer all the Questions
Question.1. Define computer security.
Explain the important objectives of computer security.
Answer:Computer security, also known as cybersecurity or IT security, is the
protection of information systems from theft or damage to the hardware, the
software, and to the information on them, as well as from disruption or
misdirection of the services they provide. It includes controlling physical
access to the hardware, as well as protecting against harm that may come via
network access, data and code injection,and due to malpractice by operators,
whether intentional, accidental, or due to them being tricked into deviating
from secure procedures.
The field is of growing importance due to the
Question.2. Explain Feistel Cipher.
Answer:In cryptography, a Feistel cipher is a symmetric structure used in the
construction of block ciphers, named after the German-born physicist and
cryptographer Horst Feistel who did pioneering research while working for IBM
(USA); it is also commonly known as a Feistel network. A large proportion of
block ciphers use the scheme, including the Data Encryption Standard (DES). The
Feistel structure has the advantage that encryption and decryption operations
are very similar, even identical in some cases, requiring only a reversal of the
key schedule. Therefore the size of the code or circuitry required to implement
such a
Question.3. Explain the following.
(a) Asymmetric Keys
Answer:An asymmetric algorithm, as outlined in the Diffie-Hellman paper, is a
trap door or one-way function. Such a function is easy to perform in one
direction, but difficult or impossible to reverse. For example, it is easy to
compute the product of two given numbers, but it is computationally much harder
to find the two factors given only their product. Given both the product and
one of the
(b) Public Key Certificate
Answer:Asymmetric cryptography or public-key cryptography is cryptography in
which a pair of keys is used to encrypt and decrypt a message so that it
arrives securely. Initially, a network user receives a public and private key
pair from a certificate authority. Any other user who wants to send an
encrypted
(c) Public Key (Asymmetric) Cryptographic
Algorithm
Answer:Public-key cryptography refers to a set of cryptographic algorithms that
are based on mathematical problems that currently admit no efficient solution
-- particularly those inherent in certain integer factorization, discrete
logarithm, and elliptic curve relationships. It is computationally easy for a
user to
(d) Public Key Infrastructure (PKI)
Answer:A public key infrastructure (PKI) is a set of hardware, software, people,
policies, and procedures needed to create, manage, distribute, use, store, and
revoke digital certificates and manage
Question.4. (a) Explain digital signature.
Answer: A digital signature is a mathematical scheme for demonstrating the
authenticity of a digital message or documents. A valid digital signature gives
a recipient reason to believe that the message was created by a known sender,
that the sender cannot deny having sent the message (authentication and
non-repudiation), and that the message was not altered in transit (integrity).
Digital signatures are commonly used for software distribution, financial
transactions, and in other cases where it is important to detect forgery or
tampering.
(b) Explain the different types of attacks
on digital signatures.
Answer:In their foundational paper, Goldwasser, Micali, and Rivest lay out a
hierarchy of attack models against digital signatures:
·
In a
key-only attack, the attacker is only given the public verification key.
·
In a
known message attack, the attacker is given valid signatures for a variety of
messages known by the attacker but not chosen by the attacker.
·
In an
adaptive chosen
Question.5. Explain the Benefits of IP security.
Answer:Internet Protocol Security (IPSec) is a framework of open standards for
ensuring private, secure communications over Internet Protocol (IP) networks,
through the use of cryptographic security services. IPSec is a suite of
cryptography-based protection services and security protocols. Because it
requires no changes to programs or protocols, you can easily deploy IPSec for
existing networks.
The driving force for the acceptance and
deployment of secure IP is the need for business and government users to
connect their
Question.6. Define the following terms used
in the IEEE 802.11 standard.
(a) Access point (AP)
Answer:In computer networking, a
wireless access point (WAP) is a networking hardware device that
allows wireless devices to connect to a wired network using Wi-Fi, or related
standards. The AP usually connects to a router (via a wired network) as a
standalone device, but it can also be an integral component of the router
itself. An AP is differentiated from a hotspot, which is the physical space
where
(b) Basic
service set (BSS)
Answer: Basic Service Set is a component of the IEEE
802.11 WLAN architecture. This network architecture is built around a Basic
Service Set (BSS), which is actually a set of STAs (the component that connects
to the wireless medium such as a network adapter or NIC) that communicate with
each other. When one access
(c)
Coordination function
Answer:Distributed coordination function (DCF) is
the fundamental MAC technique of the IEEE 802.11 based WLAN standard. DCF
employs a CSMA/CA with binary exponential backoff algorithm.
DCF
(d)
Distribution system (DS)
Answer:A wireless distribution system (WDS) is a
system enabling the wireless interconnection of access points in an IEEE 802.11
network. It allows a wireless network to be expanded using multiple access
points
(e)
Extended service set (ESS)
Answer:An extended service set (ESS) is one or more
interconnected basic service sets (BSSs) and their associated
Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.