






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A complete detailed walkthrough of the various Network Security and Cryptography concepts.
Typology: Lecture notes
1 / 10
This page cannot be seen from the preview
Don't miss anything!
Module 2 Very short, Short & Long Type Questions Solution Model
*Sub key generation algorithm *Round function *Fast software Encryption/Decryption *Ease of analysis
ciphertext.
i. Disclosure: Release of message contents to any person or process not processing the appropriate cryptographic key ii. Traffic Analysis: Discovery of the pattern of traffic between parties. In a connection oriented application, the frequency and duration of connections could be determined. In either a connection oriented or connectionless environment, the number and length of messages between parties could be determined. iii. Masquerade: Insertion of messages into the network from a fraudulent source. This includes the creation of messages by an opponent that are purported to come from an authorized entity. Also included are fraudulent acknowledgements of message receipt or no receipt by someone other than the message recipient. iv. Content modification: Changes to the contents of a message , including insertion, deletion, transposition, and modification. v. Sequence modification: Any modification to a sequence of messages between parties, including insertion, deletion, and modification. vi. Timing modification: Delay or replay of messages. In a connection oriented application, an entire sessio or sequence of mes ges could be a replay of some previous valid session, or individual messages in the sequence could be delayed or replayed. In connectionless application, an individual message could be delayed or replayed. vii. Source repudiation: Denial of transmission of message by source. viii. Destination repudiation: Denial of receipt of message by destination.
⦁ (i) Using SDES decrypt the string 10100010 using the key 0111111101. Show all calculations and result. (ii) Using SDES decrypt the string 10101010 using the key0111111101. Show all calculations and result.