Try to make it as simple as you can and explain as much as it
needed.
What is Trusted Third Party (TTP)? What are the problems with
TTP? (3 points)
Ans:
Using Caesar cipher algorithm and key value = 4, encrypt the
plain text “Network Security”. Show your
work. (3
points)
Ans:
Let k be the encipherment key for a Caesar cipher. The
decipherment key differs; it is 26 - k. One of the characteristics
of a public key system...
Try to make it as simple as you can and explain as much as it
needed.
Define Integrity and Nonrepudiation? (2 points)
Ans:
What are the differences between Stream Cipher and Block
Cipher? (2 points)
Ans:
What is Access Control and why is it important? (2 points)
Ans:
Message Authentication Code ensures authentication or integrity
or both? Justify and explain your answer. (3 points)
Ans:
What are the weaknesses of DES? Why triple DES is better than
Double DES? (3...
Try to make it as simple as you can and explain as much as it
needed.
What are the differences between symmetric encryption and
asymmetric encryption? (1 point)
Ans:
What is pseudo random numbers? (1 point)
Ans:
What is Moore’s Law? (1 point)
Ans:
What are four different block cipher modes? (1 point)
Ans:
What is one-time pad? (1 point)
Ans:
Try to make it as simple as you can and explain as much as it
needed.
What is Trusted Third Party (TTP)? What are the problems with
TTP? (3 points)
Ans:
Using Caesar cipher algorithm and key value = 4, encrypt the
plain text “Network Security”. Show your
work. (3
points)
Ans:
Let k be the encipherment key for a Caesar cipher. The
decipherment key differs; it is 26 - k. One of the characteristics
of a public key system...
Try to make it as simple as you can and explain as much as it
needed.
Define Integrity and Nonrepudiation? (2 points)
Ans:
What are the differences between Stream Cipher and Block
Cipher? (2 points)
Ans:
What is Access Control and why is it important? (2 points)
Ans:
Message Authentication Code ensures authentication or integrity
or both? Justify and explain your answer. (3 points)
Ans:
What are the weaknesses of DES? Why triple DES is better than
Double DES? (3...
Try to make it as simple as you can and explain as much as it
needed.
Define Integrity and Nonrepudiation? (2 points)
Ans:
What are the differences between Stream Cipher and Block
Cipher? (2 points)
Ans:
What is Access Control and why is it important? (2 points)
Ans:
Message Authentication Code ensures authentication or integrity
or both? Justify and explain your answer. (3 points)
Ans:
What are the weaknesses of DES? Why triple DES is better than
Double DES? (3...
Try to make it as simple as you can and explain as much as it
needed.
What are the differences between symmetric encryption and
asymmetric encryption? (1 point)
Ans:
What is pseudo random numbers? (1 point)
Ans:
What is Moore’s Law? (1 point)
Ans:
What are four different block cipher modes? (1 point)
Ans:
What is one-time pad? (1 point)
Ans:
Try to make it as simple as you can and explain as much as it
needed.
What are the differences between symmetric encryption and
asymmetric encryption? (1 point)
Ans:
What is pseudo random numbers? (1 point)
Ans:
What is Moore’s Law? (1 point)
Ans:
What are four different block cipher modes? (1 point)
Ans:
What is one-time pad? (1 point)
Ans:
Try to make it as simple as you can.
You need to do some research on different types of cryptography
libraries in Python. Find out how can we use cryptography libraries
in Python. Write down the steps to install the cryptography library
in Python. Write a small program to encrypt and decrypt a message
using the Python library.
Try to make it as simple as you can. Please provide the answers
with some examples as fast as you can.
11-Which of the following do
all domains in the same
forest have in common? (Choose all that
apply.)
a) The same domain name
b) The same schema
c) The same user accounts
d) The same global catalog
12-Which of the following is a
valid reason for using
multiple forests?
a) Centralized management
b) Need for different schemas
c) Easy...