Author: Tygojin Shakagis
Country: Ecuador
Language: English (Spanish)
Genre: Video
Published (Last): 15 July 2014
Pages: 179
PDF File Size: 7.66 Mb
ePub File Size: 14.96 Mb
ISBN: 225-6-79574-363-3
Downloads: 80406
Price: Free* [*Free Regsitration Required]
Uploader: Meztihn

Define security mechanism It is process that is designed to detect prevent, recover from a security attack. It conceals the existence of a message. Differentiate unconditionally secured and computationally secured.

Service that ensures that only authorized person able to modify the message. Fabrication, Modification, and Interruption 3. Compare stream cipher with block cipher with example. Encryption is cryptography and network security question bank with answers pdf download secured means, 1. Which one of the following is a cryptographic protocol used to secure HTTP connection? Specify the four categories of security threads?

Specify the components of encryption algorithm. In cryptography, the order of the letters in a message is rearranged by a transpositional cryptography and network security question bank with answers pdf download b substitution ciphers c both a and b d none of the mentioned View Answer Answer: Leave a Reply Cancel reply You must be logged in to post a comment. This service helps to prove that the person who denies the transaction is true or false.

Hiding the message into some cover media. Cryptanalysis is used a to find some insecurity in a cryptographic scheme b to increase the speed c to encrypt the data d none of the mentioned View Answer Answer: It ensures that the information in a computer system and transmitted information are accessible only for reading by authorized person. Differentiate symmetric and asymmetric encryption? Why network need security? It is process that is designed to detect prevent, recover from a security attack.

Computer Networks Questions & Answers – Cryptography

You must be logged in to post a comment. Vikram in Uncategorized 0 Views. Interruption Interception Modification Fabrication 2. Explain active and passive attack with example?

It involves the modification of data stream or creation of false data stream.

Cryptography – Computer Networks Questions & Answers – Sanfoundry

Securuty hash function takes an arbitrary block of data and returns a fixed size bit string b variable size bit string c both a and b d none of the mentioned Cryptography and network security question bank with answers pdf download Answer Answer: What is data encryption standard DES?

Monitoring the message during transmission. The process of converting from plain text to cipher text. Which one of the following algorithm is not used in asymmetric-key cryptography? Processes the input one block of elements at a time producing an output block for each input block. In cryptography, what is cipher? Define confidentiality and authentication Confidentiality: Define integrity and non repudiation? Define Encryption The process of converting from plain text to cipher text.

It is a process of attempting to discover the pxf or plain text or both. It is a form of cryptosystem in which encryption and decryption Performed using two keys.

Define steganography Hiding the message into some cover media. It means how to maintain the secrecy of message. Encryption algorithm, Digital signature, Authentication protocols. Symmetric Asymmetric It is a form of crypto-system in which encryption and decryption performed using the same key. Time required to break the cipher exceed the useful lifetime of nad.

Fabrication, Modification, and Interruption. ElGamal encryption system is a symmetric key encryption algorithm b asymmetric key encryption algorithm c not an encryption algorithm d none of the mentioned View Answer Answer: When systems are connected through the network, attacks are possible during transmission time. The cost of breaking the cipher exceed the value of enough information. Processes cryptography and network security question bank with answers pdf download input stream continuously and producing one element at a time.

In asymmetric key cryptography, the private key is kept by a sender b receiver c sender and receiver d all the connected devices to the network View Answer Answer: