Explain: Assignment-1
Explain: Assignment-1
+Event Detection
+Security Audit Trail
Q5: What is the difference between passive and Active Security Attacks?
Passive attacks have to do with eavesdropping on, or monitoring transmissions. Email, file transfers, and
client/server exchanges are examples of transmissions that can be monitored.
+Active attacks include the modification of transmitted data and attempts to gain unauthorized access to
computer systems.
Q6: What are the essential ingredients of a symmetric cipher?
Plaintext: This is the original intelligible message or data that is fed into the algorithm as input.
Encryption algorithm: The encryption algorithm performs various substitutions and
transformations on the plaintext.
Secret Key: The secret key is also input to the encryption algorithm. The key is the value
independent of the plaintext. The algorithm will produce a different output depending on the
specific key being used at the time. The exact substitutions and transformations performed by the
algorithm depend on the key.
Cipher text: This is the scrambled message produced as output. It depends on the plaintext and
the key.
Decryption algorithm: This is essentially the encryption algorithm in reverse. It takes the cipher
text and the secret key and produces the original plaintext.
Assignment-2
Q1: What is the difference between a block cipher and a Stream Cipher?
A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to
operate on one bit at a time or on units larger than a byte at a time.
A stream cipher is a function which directly maps kk-bit keys and arbitrary length plaintexts to (same
arbitrary length) ciphertext, in such a way that prefixes of the plaintext map to prefixes of the ciphertext,
i.e. we can compute the starting part of the ciphertext before the trailing part of the plaintext is known.
A block cipher encrypts one block at a time. The block may be of size one byte or more or less. That
means we can also encrypt a block of one byte by help of a stream cipher as a stream.
A block cipher is a deterministic and computable function of kk-bit keys and nn-bit (plaintext) blocks
to nn-bit (ciphertext) blocks. (More generally, the blocks don't have to be bit-sized, nn-character-blocks
would fit here, too). This means, when you encrypt the same plaintext block with the same key, you'll get
the same result.
Computer documents, emails, text and instant messages, transactions, images and Internet
histories are examples of information that can be gathered from electronic devices and used very
effectively as evidence. For example, mobile devices use online-based based backup systems,
also known as the cloud, that provide forensic investigators with access to text messages and
pictures taken from a particular phone. These systems keep an average of 1,0001,500 or more
of the last text messages sent to and received from that phone.
In addition, many mobile devices store information about the locations where the device traveled
and when it was there. To gain this knowledge, investigators can access an average of the last
200 cell locations accessed by a mobile device. Satellite navigation systems and satellite radios
in cars can provide similar information. Even photos posted to social media such as Facebook
may contain location information. Photos taken with a Global Positioning System (GPS)-enabled
device contain file data that shows when and exactly where a photo was taken. By gaining a
subpoena for a particular mobile device account, investigators can collect a great deal of history
related to a device and the person using it.
Q4: What is an elliptic curve?
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve
theory that can be used to create faster, smaller, and more efficient cryptographickeys. ECC generates
keys through the properties of the elliptic curve equation instead of the traditional method of generation
as the product of very large prime numbers.
Q5: List four general categories of schemes for the distribution of public keys?
Public announcement
Publicly available directory
Public-key authority
Public-key certificates
Q6: Users A and B uses the diffie - helman key Exchange technique with a common prime q=71 and a
primitive root Alpha=7.
a. If user A has a private key Xa =5 ,What is As public key Ya?
b. If user B has private key Xb=12,what is Bs public Yb?
c. What is the shared secret key?