What are two basic functions used in encryption algorithms

Assignment Help Computer Engineering
Reference no: EM132756952

Assignment: Chapter-1

1. What is the OSI security architecture?

2. List and briefly define the three key objectives of computer security.

3. List and briefly define categories of passive and active security attacks.

4. List and briefly define categories of security services.

5. List and briefly define categories of security mechanisms.

6. List and briefly define the fundamental security design principles.

7. Explain the difference between an attack surface and an attack tree.

Chapter-2

1. What does it mean to say that b is a divisor of a?

2. What is the meaning of the expression a divides b?

3. What is the difference between modular arithmetic and ordinary arithmetic?

4. What is a prime number?

5. What is Euler's totient function?

6. The Miller-Rabin test can determine if a number is not prime but cannot determine if a number is prime. How can such an algorithm be used to test for primality?

7. What is a primitive root of a number?

8. What is the difference between an index and a discrete logarithm?

Chapter- 3

1. Describe the main requirements for the secure use of symmetric encryption.

2. What are the two basic functions used in encryption algorithms?

3. Differentiate between secret-key encryption and public-key encryption.

4. What is the difference between a block cipher and a stream cipher?

5. What are the two general approaches to attacking a cipher?

6. List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

7. What is the difference between an unconditionally secure cipher and a computationally secure cipher?

8. Why is the Caesar cipher substitution technique vulnerable to a brute-force cryptanalysis?

9. How much key space is available when a monoalphabetic substitution cipher is used to replace plaintext with ciphertext?

10. What is the drawback of a Playfair cipher?

11. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher?

12. What are two problems with the one-time pad?

13. What is a transposition cipher?

14. What are the drawbacks of Steganography?

Reference no: EM132756952

Questions Cloud

Media analysis project : Choose a specific visual work to analyze for your Media Analysis Project (MAP).
Explain the time preference for money concept : Explain the time preference for money concept. What is insider trading and why is it against the law. What is the SEC and what is it mission
Discuss importance of netiquette : Discuss the importance of netiquette in professional electronic communication.
Which a user of the entity financial statement would : Joint arrangement, a user of the entity's financial statement would most likely find out in the notes that the nature of the joint arrangement is a(an)
What are two basic functions used in encryption algorithms : What are the two basic functions used in encryption algorithms? Differentiate between secret-key encryption and public-key encryption.
Which is group allowed to measure the philippine subsidiary : In the consolidated financial statements, is the group allowed to measure the Philippine subsidiary's property under the cost model?
Target the appropriate professional audience : Target the appropriate professional audience. Use appropriate language for professional audience.
Phenomena of complete validity-fulfillments of wishes : On the contrary, they are psychical [mental] phenomena of complete validity-fulfillments of wishes.
Business analytics : Examine the role of Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd