BT0088 – Cryptography and Network Security

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

ASSIGNMENT

PROGRAM BSc
SEMESTER V
SUBJECT CODE & NAME Cryptography and Network Security
CREDIT 4
BK ID BT0088
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Describe the stream and block encryption with their advantages and disadvantages.

Answer:- While both are symmetric ciphers, stream ciphers are based on generating an “infinite” cryptograpic keystream, and using that to encrypt one bit or byte at a time (similar to the one-time pad), whereas block ciphers work on larger chunks of data (i.e. blocks) at a time, often combining blocks for additional security (e.g. AES in CBC mode).

 

Q.2 Compare DES and AES algorithms.

Answer:- DES (Data Encryption Standard) is a rather old way of encrypting data so that the information could not be read by other people who might be intercepting traffic. DES is rather quite old and has since been replaced by a newer and better AES (Advanced Encryption Standard). The replacement was done due to the inherent weaknesses in DES that allowed the encryption to be broken using certain methods of attack. Common applications of AES, as of

 

Q.3 Explain Developmental Controls and Administrative Controls.

Answer:- ADMINISTRATIVE CONTROL At the end of the lecture student will be able to:-Understand the concept of Administrative Accountability and Control-Understand the types of internal accountability and external accountability Administrative AccountabilityAccording to Leonard D. White accountability is `the sum total of constitutional, statutory

 

Q.4 List all the models of security and explain any two models.

Answer:- A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all.

A security policy is a document that expresses clearly and concisely what the protection mechanisms are to achieve. Its a statement of the security we expect the

 

Q.5 Define and explain IP security. Explain IP security architecture.

Answer: – IP Security Architecture

The purpose of the IP Security Architecture (IPSEC) is to provide a standard security mechanism and services to the currently used IP version 4 (IPv4) and to the new IP version 6 (IPv6). It does this by specifying two standard headers to be used with both versions of IP datagrams: “IP Authentication Header” (AH) and “IP Encapsulating Security Payload” (ESP

 

6 Describe guard and personal firewalls

Answer: – Firewalls are an excellent tool for securing a network. A firewall is system designed to prevent unauthorized access to or from a private network and basically limits access to a network from another network. Firewall that can be implemented in hardware or software, or a combination of both either denies or allows outgoing traffic known as egress filtering or incoming traffic known as ingress filtering.

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

 

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

(Prefer mailing. Call in emergency )

 

 

Leave a Reply