Ccs 2 Marks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

4.

Fermat's Little Theorem


Fermat's Little Theorem states that if p is a prime number, then for any integer a not divisible by
p, the number a^(p-1) - 1 is an integer multiple of p.
5. Private Key Cryptography vs Public Key Cryptography
● Private Key Cryptography:
○ Uses a single key for both encryption and decryption.
○ Key must be securely shared between sender and receiver.
○ Faster than public-key cryptography.
○ Examples: AES, DES
● Public Key Cryptography:
○ Uses a pair of keys: a public key for encryption and a private key for decryption.
○ Public key can be shared with anyone, while the private key is kept secret.
○ Slower than private-key cryptography.
○ Examples: RSA, Diffie-Hellman
6. RSA Algorithm vs SHA
● RSA:
○ Asymmetric encryption algorithm.
○ Used for digital signatures and secure communication.
○ Relies on the difficulty of factoring large numbers.
● SHA:
○ Cryptographic hash function.
○ Used for data integrity and message authentication.
○ Produces a fixed-size hash value from input data.
7. MAC vs Hash
● MAC (Message Authentication Code):
○ A cryptographic technique that combines a secret key with a message to produce a
fixed-size tag.
○ Used for both data integrity and authentication.
● Hash:
○ A mathematical function that maps input data to a fixed-size output.
○ Used for data integrity and message authentication.
8. Mathematics Behind ElGamal Cryptosystem
The ElGamal cryptosystem relies on the difficulty of the discrete logarithm problem in a finite
field. It involves operations in a finite field, such as modular exponentiation and multiplication.
9. Applications of X.509
X.509 is a standard for public key infrastructure (PKI). Its applications include:
● Secure communication (SSL/TLS)
● Digital certificates for authentication
● Secure email
● E-commerce
10. Requirements of Kerberos
Kerberos requires the following components:
● Key Distribution Center (KDC): Issues tickets and keys.
● Authentication Server (AS): Authenticates users and issues tickets.
● Ticket Granting Server (TGS): Issues tickets for specific services.
● Client and Server: Entities that communicate securely.
11. Information Security
Information security is the practice of protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction.
12. Cybercrime
Cybercrime refers to criminal activities that involve computers and networks, such as hacking,
phishing, and identity theft.
13. Cybersecurity
Cybersecurity is the practice of protecting computer systems and networks from digital attacks.
It involves a range of technologies and processes designed to prevent, detect, and respond to
cyber threats.
14. Spyware
Spyware is software that collects information about a user's activities without their knowledge or
consent. It can be used to track browsing habits, steal passwords, and monitor keystrokes.
15. Key Practices for Cloud Security
Key practices for cloud security include:
● Strong access controls and identity management
● Data encryption
● Regular security audits and vulnerability assessments
● Network security measures
● Incident response planning
● Regular software updates and patching
● https://brainly.in/question/57477284
● https://facts.net/mathematics-and-logic/mathematical-sciences/7-facts-you-must-know-ab
out-fermats-little-theorem/
● https://www.bavinfosec.com/faq
● https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002

You might also like