QUESTION
(a) Distinguish between passive and active attacks.
(b) Give two reasons why it is important to organise security awareness programs for users.
(c) Explain how symmetric cryptography provides
- confidentiality
- authentication
(d) What are the two types of operations used by symmetric cryptography?
(e) Justify Kerchoff's principle
(f) Which cryptanalytic attack is almost always theoretically feasible?
(g) Mention the four requirements that have to be satisfied for the one-time pad algorithm to provide unconditional security
(h) Why is it that the one-time-pad algorithm provides unconditional security?