Question: A) Differentiate: Block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples (Max Half a page)
B) i) Compare monoalphabetic and polyalphabetic ciphers.
ii) using the Caesar Cipher Method, crack this coded message-decrypt the ciphertext-WXWRULDO. Illustrate your work(Max half a page)
References and in-text citations must be APA compliant.
C) i). In what ways can a hash value be secured so as to provide message authentication?(Half a page)
ii). Elaborate on the applications, weaknesses and limitations of the hashing algorithms.(Half a page)
References and in-text citations must be APA compliant.
D) i) In steganalysis, which methods are used to detect steganography?(Half a page)
ii) Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryptions.(Half a page)
References and in-text citations must be APA compliant.