Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
questiona give a detailed explanation of the following some dynamics systems can be built as variations on the client server modelb give one main
questiona define and distinguish between electronic commerce and electronic businessb according to you what are the benefits that electronic commerce
question1 a system analyst has to install a particular type of topology in a textile industrya describe using diagrams the three most common
questionwrite a report to explain the concept of lan and wan including the various components of the telecommunication infrastructure required by utm
problem a describe rsa algorithm with an exampleb answer the following rsa encryption given the values of the primes are p 17 q 11 and choosing e
a describe the concept of zero knowledge proofs give a practical exampleb explain how a one way hash function worksc what are message authentication
a what are the different architectures for wireless networksb explain how wep authentication and encryption works describe the vulnerabilityc in what
problem a differentiate between private key and public key encryptionb what issue with private key encryption is resolved with public key encryptionc
problem 1solve the following caesar cipher by showing your working em kium em aie em kwvycmzmlproblem 2compare and contrast between block and stream
question 1a explain briefly the following terms as used in network securityi denial of service dos attackii birthday attackiii demilitarized
a an opponent is using rsa with the public key e53 n77 you intercept the ciphertext c10 all values on this problem including the ciphertext and the
a explain the importance of the euler totient function in cryptography calculate euler totient function value phi1280b explain the role of the
problem a using vigenegravere cipher and given the key abc find the ciphertext for the messagesimplicityonly the 26 lower-case alphabetical
a briefly explain the following security goals provided by cryptography confidentiality authentication integrity and non-repudiationb state
a using fermats theorem find 3201 mod 11b explain how the diffie-hellman key agreement protocol works and what its purpose and main properties
ai bob has public rsa key n 77 e 7show that bobs private key is d 43ii alice wants to send the message m 13 to bob she encrypts the message
a i if m pmiddotqmiddotr where p q and r are prime numbers what is phimii therefore determine phi440b describe the following terms as used in
use the chinese remainder theorem to evaluate x from the following simultaneous congruencesx equiv 1 mod 2 x equiv 2 mod 3 x equiv 3 mod 5calculate
a using the extended euclidean algorithm find the multiplicative inverse of 504 mod 67b decrypt the following ciphertext which has been encrypted
a consider the subsequent authentication optionsa using passwordb using pin and fingerprintwhich option a or b provides stronger security and whyb
a which pki public key infrastructure model is typically favored by business organizationb give one possible use of the extensions field of an
a explain the two possible configuration for 3desb what is the main disadvantage of 3desc why are most modern symmetric algorithm block ciphersd
problema distinguish between passive and active attacksb give two reasons why it is important to organise security awareness programs for usersc
problema give two reasons for companies to implement security measuresb what is the regulatory expectation regardingi healthcare information ii
a describe rsa encryptionb for an rsa encryption the values of the primes are p29 q31 select e11 evaluate the public and private keysc how can rsa be