CS535D_WEEK2_SANDEEP CHOWDARY_16831YS
Review Questions:
2.1 What are the essential ingredients of a symmetric cipher?
A symmetric cipher encryption has five ingredients. They are:
Plaintext
Encryption algorithm
Secret key
Cipher text
Decryption algorithm

CS535(E)_Week#9_16301_LaxmanaRaoGaridepalli
REVIEW QUESTIONS:
10.1 Briefly explain diffie-hellman key exchange?
Ans: the first published public-key algorithm appeared in the seminal paper by diffie and hellman that
defined public-key cryptography and is g

CS535(E)_Week#5_16301gl_LAXMANA RAO GARIDEPALLI
6.1
Triple Data Encryption Standard (DES) is a type of computerized cryptography where block cipher
algorithms are applied three times to each data block. The key size is increased in Triple DES to ensure
ad

CS535(E)_Week#3_16301_LaxmanaRao Garidepalli
3.1 why is it important to study the Feistel cipher?
Ans: It is proposed the use of a cipher that alternates substitutions and permutations
Substitutions:
Each plaintext element or group of elements is uniquely

CS535(E)_Week#12_16301_LaxmanaRaoGaridepalli
Firewall Exercise
BACKGROUND:
1.
Start the Firewall program from the Tools menu of the class web site. You should see a
screen similar to the one below:
Choose no firewall and click next. The following screen w

CS535(E)_Weeek#4_16301gl_LaxmanaRao Garidepalli
CS535(E)_Week#4_16301_LAXMANA RAO GARIDEPALLI
4.1 RING:A ring R, sometimes denoted by cfw_R, +, *, is a set of elements with two binary
operations, called addition and multiplication,6 such that for all a, b

CS535(E)_Week#3_16301gl_LAXMANA RAO GARIDEPALLI
CS535(E)_Week#3_16301gl_LAXMANA RAO GARIDEPALLI
3.1 a. For an n-bit block size are 2n possible different plain text blocks and
2n possible different cipher text blocks. For both the plain text and cipher
tex

CS535(E)_Week#1_16301_LaxmanaRao garidepalli
1.1.OSI NETWORK ARCHITECTURE:
To assess effectively the security needs of an organization and to evaluate and choose
various security products and policies, the manager responsible for security needs some
syste

CS535_Week#11_16301_LaxmanaRaoGaridepalli
12.1) What types of attacks are addressed by message authentication?
In the context of communications across a network, the following attacks can be
identified.
1. Disclosure: Release of message contents to any pe

01:- Using web resources find a virus that has been released in the past 6 months.
The Klez virus, for example, stole confidential emails and spreads them around the web via
mass emails, in some instances costng millions of dollars in damages due to jammi

CS535D_WEEK4_SANDEEP CHOWDARY_16831YS
Review Questions:
4.1 Briefly define a group?
A group is a set of elements that is closed under a binary operation and that is
Associative and that includes an identity element and an inverse element.
4.3 Briefly defi

CS535D_WEEK3_SANDEEP CHOWDARY_16831YS
Review Questions:
3.1 Why is it important to study the Feistel cipher?
Feistel cipher using the concept of a product cipher, which is the performing
of two or more basic ciphers in sequence in such a way that the fina