What happens to spaces and punctuation in a caesar cipher

Assignment Help Computer Network Security
Reference no: EM13986680

1. a) If a message reads "We begin bombing in five minutes.", what would this look like in a Caesar cipher with k=12?

b) What happens to spaces and punctuation in a Caesar cipher?

c) Who got in trouble for using that phrase, and when?

2. With public key encryption, there are two ways you could send a message from Harvey to Eunice:

A. Harvey would apply his private key to the message, and Eunice would decrypt it using Harvey's public key

B. Harvey would apply Eunice's public key to the message, and Eunice would decrypt it using her private key.

How do these methods (A versus B) differ in terms of the authentication and confidentiality provided? Be sure to answer both aspects for both methods.

3. Why does it matter if a server has unused ports left open? What kind of attacks could take advantage of this?

4. a) If I maintain an offsite backup of my system so I can restore it after a virus wipes it out, is this part of a prevention, detection, or mitigation strategy? Explain your answer.

b) Provide examples of the other two strategies for that threat.

5. What algorithms did we discuss for:

a) symmetric encryption?

b) public key encryption?

6. SHAVS is a validation test suite for SHA (NIST, 2004). What three kinds of tests does it execute? How long is the longest test string used?

7. a) How does a message digest differ from a digital signature?

b) Would it be practical to use both on the same message? Explain your answers.

8. In what way are MD5 and SHA different from DES and RSA?

9. What kind of attack does the use of a nonce prevent?

10. What kind of key authority is used to prevent the man-in-the-middle attack when using public key encryption?

11. How does the output of MD5 differ from that of SHA-1?

12. Snort can do both signature-based and anomaly-based intrusion detection, but it can also do a third kind of detection. Name and describe it.

13. AES and RSA can both have 128-bit keys. Which is stronger, and why?

14. How does 802.11n differ from 802.11g?

15. If 802.11a uses 11 channels, what is the span of frequencies for each channel?

16. Describe in your own words the difference between DIFS and SIFS.

17. Find two specific retail devices that use the Zigbee protocol. Describe them and cite their sources.

18. If you want your home network to be more secure, would you use agent advertisement or agent solicitation? Explain your answer.

19. The new "4K SUHD" TVs can scan 3840 x 2160 pixels at up to 240 Hz. Assuming 32 bits of data per pixel, what data rate is needed to support them without compression?

20. Describe the differences between symmetric and public key encryption. Address how to provide authentication, confidentiality, and verify message integrity using them.

21. What type of attack makes public key encryption less secure than symmetric?

22. How is an access control list used by a firewall?

23. What does a MIB store and where does it get it from?

24. What environmental conditions might you monitor for a physically remote network location (e.g. your system is in a building in the woods), and what potential problem would you look for with respect to each condition? Identify at least three conditions.

Reference no: EM13986680

Questions Cloud

Despite the isolation of sakoku : Despite the isolation of sakoku, set the stage for Japan's future modernization? What were some of the reforms initiated during the Tokugawa era? What were some of the benefits, problems, and consequences associated with these reforms?
How fast is the box moving as it leaves the slope : A box slides from rest down a curved slope. it's initial height is 30m above the ground, and it comes off the slope 8m above the ground. How fast is the box moving as it leaves the slope?
What is magnitude of the acceleration of the box along ramp : What is the magnitude of the acceleration of the box along the ramp? How far along the ramp does the box go before coming to rest?
What is the acceleration of the box down the ramp : A box of mass 0.450 kg slides down a very smooth (frictionless) ramp which is inclined at an angle of 40.0o above the horizontal. What is the acceleration of the box down the ramp?
What happens to spaces and punctuation in a caesar cipher : What kind of attack does the use of a nonce prevent - what kind of key authority is used to prevent the man-in-the-middle attack when using public key encryption?
What angle measured from the vertical : 1. A scuba diver, submerged under water, looks up and sees sunlight at an angle of angle of 28.00 from the vertical. At what angle, measured from the vertical, does the sunlight hit the water?
Complete the attached simulation template : Determine the selling price per unit that should be established for this product using your simulation results and assuming that the company wants to realize an average markup of $20 on each unit sold.
Problem about basis for adjusting entries-annual adjustments : The following account balances are taken from the records of Laugherty Inc. at December 31, 2014. The Supplies account represents the cost of supplies on hand at the beginning of the year plus all purchases. A physical count on December 31, 2014, ..
How much energy is stored in each capacitor : What is the potential difference between the plates after a sheet of Teflon is inserted between them? Express your answer with the appropriate units.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Advantage of partial order on the empirical relation system

What is the advantage of having a partial order on the empirical relation system and  Why is the number of decisions plus 1 an important method for calculating McCabe's cyclamate number?

  What was the volume of digital evidence

Cybersecurity or Digital Forensics- Select a real world event related to Cybersecurity or Digital Forensics. What was the volume of digital evidence

  What can employees do to protect against attacks

What can employees do to protect against intrusion and attacks? Complete the following for this assignment:Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Explain why shared accounts is considered bad practice

In your own words, explain why each of the following is considered bad practice:

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  Calculate the total gross pay for each employee.

Calculate the total Gross Pay for each employee. Keep in mind that employees are paid time and a half for all over-time hours. Here is an example formula that demonstrates how you would make such a calculation: =b4*d4+b4*c4*1.5 These must be formu..

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Explain the security mechanisms available for a database

this assignment requires the use of a relational database management system. strayer university provides each student

  Explore twitter connect with your find friends

Explore Twitter connect with your find friends. Configure and customize your privacy settings in your Twitter account. Create and use an account in a Twitter to interact with friends.

  Describe the fundamental security policies outlined by pci

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standa..

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd