Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
a describe the concept of zero knowledge proofs give a practical exampleb explain how a one way hash function worksc what are message authentication
a what are the different architectures for wireless networksb explain how wep authentication and encryption works describe the vulnerabilityc in what
problem a differentiate between private key and public key encryptionb what issue with private key encryption is resolved with public key encryptionc
problem 1solve the following caesar cipher by showing your working em kium em aie em kwvycmzmlproblem 2compare and contrast between block and stream
question 1a explain briefly the following terms as used in network securityi denial of service dos attackii birthday attackiii demilitarized
a an opponent is using rsa with the public key e53 n77 you intercept the ciphertext c10 all values on this problem including the ciphertext and the
a explain the importance of the euler totient function in cryptography calculate euler totient function value phi1280b explain the role of the
problem a using vigenegravere cipher and given the key abc find the ciphertext for the messagesimplicityonly the 26 lower-case alphabetical
a briefly explain the following security goals provided by cryptography confidentiality authentication integrity and non-repudiationb state
a using fermats theorem find 3201 mod 11b explain how the diffie-hellman key agreement protocol works and what its purpose and main properties
ai bob has public rsa key n 77 e 7show that bobs private key is d 43ii alice wants to send the message m 13 to bob she encrypts the message
a i if m pmiddotqmiddotr where p q and r are prime numbers what is phimii therefore determine phi440b describe the following terms as used in
use the chinese remainder theorem to evaluate x from the following simultaneous congruencesx equiv 1 mod 2 x equiv 2 mod 3 x equiv 3 mod 5calculate
a using the extended euclidean algorithm find the multiplicative inverse of 504 mod 67b decrypt the following ciphertext which has been encrypted
a consider the subsequent authentication optionsa using passwordb using pin and fingerprintwhich option a or b provides stronger security and whyb
a which pki public key infrastructure model is typically favored by business organizationb give one possible use of the extensions field of an
a explain the two possible configuration for 3desb what is the main disadvantage of 3desc why are most modern symmetric algorithm block ciphersd
problema distinguish between passive and active attacksb give two reasons why it is important to organise security awareness programs for usersc
problema give two reasons for companies to implement security measuresb what is the regulatory expectation regardingi healthcare information ii
a describe rsa encryptionb for an rsa encryption the values of the primes are p29 q31 select e11 evaluate the public and private keysc how can rsa be
a describe des encryption with a block diagram and brief stepsb how does triple des improve security what is the effective key length of triple des
a what is a pseudorandom generator give an example describing how it worksb explain the key components of a wireless network and their purposec
a show four network security attacks how do they compromise securityb in what ways do the following devices or services contribute to securityi
the following dna sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor tf the nucleotide