Assignment Network Security Architecture

1
Network Secuirty- Assignment 1 Provide the answer in paper Due date: 7-April-2015 1. What is the difference between passive and active security threats? (1 Point) 2. List and briefly define categories of passive and active security attacks. (1 Point) 3. What are the essential ingredients of a symmetric cipher? (1 Point) 4. What is the difference between a block cipher and a stream cipher? (1 Point) 5. What is the difference between a block cipher and a stream cipher? (1 Point) 6. What is the difference between diffusion and confusion? (1 Point) 7. What is triple encryption? (1 Point) 8. What are the principal elements of a public-key cryptosystem? (1 Point) 9. What is a one-way function? (1 Point) 10. Perform encryption and decryption using the RSA algorithm, for the fol- lowing: (1 Point each) (a) p = 3; q = 11,e = 7; M =5 (b) p = 5; q = 11,e = 3; M =9 11. Briefly explain Diffie-Hellman key exchange. (1 Point) 12. What characteristics are needed in a secure hash function? (1 Point) 13. What are the properties a digital signature should have? (1 Point) 1

description

Basic questions to try hands on Network Security Architecture.

Transcript of Assignment Network Security Architecture

  • Network Secuirty- Assignment 1

    Provide the answer in paper

    Due date: 7-April-2015

    1. What is the difference between passive and active security threats? (1Point)

    2. List and briefly define categories of passive and active security attacks. (1Point)

    3. What are the essential ingredients of a symmetric cipher? (1 Point)

    4. What is the difference between a block cipher and a stream cipher? (1Point)

    5. What is the difference between a block cipher and a stream cipher? (1Point)

    6. What is the difference between diffusion and confusion? (1 Point)

    7. What is triple encryption? (1 Point)

    8. What are the principal elements of a public-key cryptosystem? (1 Point)

    9. What is a one-way function? (1 Point)

    10. Perform encryption and decryption using the RSA algorithm, for the fol-lowing: (1 Point each)

    (a) p = 3; q = 11, e = 7;M = 5

    (b) p = 5; q = 11, e = 3;M = 9

    11. Briefly explain Diffie-Hellman key exchange. (1 Point)

    12. What characteristics are needed in a secure hash function? (1 Point)

    13. What are the properties a digital signature should have? (1 Point)

    1