Cryptography And Network Security – Questions With
Complete Solutions
2 basic functions used in encryption algorithms? ✔️Ans - substitution
transposition
access control ✔️Ans - prevention of unauthorized use of resources.
accountability ✔️Ans - security goal that generates the requirements
for actions of an entity to be traced uniquely to that entity (to trace securiy
attack to a responsible party)
active attacks ✔️Ans - modification of data stream or creation of false
stream and is divided into Masquerad, Reply, Modification of messages,
Denial of service
Attacks Types (not active and passive) ✔️Ans - cryptanalysis
brute-force attack
authentication ✔️Ans - the assurance that the communicating entity is
the one that it claims to be
authentication protocols ✔️Ans - uses cryptographic algorithms to
authenticate the idnetity of entities (sender and receiver)
authenticity ✔️Ans - the ability of being verified and trusted source.
autokey vigenere cipher ✔️Ans - write the key then the same plaintext
along the plaintext then do the equation (p+k)mod26 and - for decryption
availability ✔️Ans - assures that systems work promptly and services
are not denied.
CIA triad ✔️Ans - confidentiality, integrity and availabilty
Computer security ✔️Ans - is the protection provided (afforded) to
automated info. systems to achive (attain) the aplicable objectives of
preserving the integrity, availabily and confidentiality of system resources.
, confidentiality ✔️Ans - protection of data from an unathuraized
disclosure.
connection confidentiality ✔️Ans - protection of user data on a
connection
connection integrity with recovery ✔️Ans - provide integriy to user
data on a connection, and detects and modification.., with recovery
attempted.
connection integrity without recovery ✔️Ans - provide integrity to user
data on a connection, and detects modification, without providing recovery.
connectionless confidentialiy ✔️Ans - protection of user data in a
single data block
connectionless integrity ✔️Ans - integrity of a single data block, and
detects for data modification.
cryptanalysis ✔️Ans - is based on the cryptanalyst known info. about
the pt/ct/ algorithms used or key.
cryptography systems depends on 3 things: ✔️Ans - 1. type of
operation used for encryption.
2. no. of keys used.
3. plaintext processing method
Data Encryption Standard ✔️Ans - encryption algorithm that exihbits
the feistel structure. uses 64bit block and 56bit key.
data-origin authentication ✔️Ans - in connection transfer
(connectionless) provides the confidence that the source of data arrived is
as claimed
Denial of service ✔️Ans - preventing the normal use of communicaton
facilities. by doing: suppressing all messages that is sent to server, or
diabling the network of server, or by overloading it with messages.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.