PROBLEM 1
Solution:
A) Now suppose, the two partners are X and Y. X want to send a message to Y. Both X and Y shares the same secret key. To encrypt the message X XORs her message with the shared secret key. To decrypt the message Y also XORs the message with his (the same) secret key.
Now take an example:
Key = 0011
X’s message = 0101
X’s message XORed with the key: 0011 XOR 0101 = 0110
What Y Receives = 0110
Y applies the secret key again to get the original message: 0110 XOR 0011 = 0101
B) Ans-True
C) A cryptographic hash function is a transformation that takes an input or message and returns a fixed size string, which is called the hash value. In Hashing Algorithm, the key in public key encryption is based on hash value. The hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value
Input Number
A 128-bit number has a possible 2128 combinations.
Hashing Algorithm
Input XOR 128
Hash Value
2128 XOR 128
Hash value consists of different combinations and it is not easy to break the value. So that Hashing Algorithm is appropriate for cryptography.
D) Ans-A
Non-Repudiation is one of the main issues of network security. It is used to enable the two parties of a communication to authenticate the communication, such as when a message was sent, when it was received who sent it, and who received it. Encryption is used to secure either data files or network transmissions. But it cannot verify when events happened. Integrity and Confidentiality cannot be used to verify that a message was sent or received.
PROBLEM 2
Solution:
A) Ans-B,C
The following two methods are not used to min...
... middle of paper ...
...tocol, a standardized way that a mobile phone talks to a server installed in the mobile phone network.
B) Ans- B
The 802.1x standard enhances wireless security by incorporating authentication of the user. In 802.1x, the user must enter a password to access the network. This means that if the wireless client is being used by an unauthorized user, the password requirement will keep the unauthorized user
C) Ans- C
Wi-Fi is the term used for 802.11b product.
D) Ans-B
An initialization vector is a fixed size input to a cryptographic primitive. It is an arbitrary number that can be used along with a secret key for data encryption. The use of an initialization prevents repetition in data encryption, making it more difficult for a hacker using a dictionary attack to find patterns and break a cipher.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use.
Abilities and services which can access through basic mechanisms that promote use by heterogeneous client platforms like smartphone, laptop, or even other devices.
Analysis of the Environment of the Mobile Network System Executive Summary 3 Glossary of Abbreviations 4 Introduction 5 Recent History
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Use the hashing options MD5, SHA-1, SHA-256, SHA-384, and SHA-512, with logging and the option of specifying the number of bytes to hash, such as specific blocks or sectors.
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Encryption converts a message in such as way that its contents are hidden from unauthorized readers. It is intended to keep messages and information as a secret. Plaintext, also known as clear text, is the plain or original message, which is has not yet been encrypted. Once the message is encrypted it is then called a cipher text. This process is obviously referred as encryption. The exact opposite process is called decryption. Encryption is the most successful way to attain data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Data encryption is a means of scrambling the data so that is can only be read by the person holding the key, a password of some sort. Without the key, the cipher cannot be broken and the data remains secure. Using the key, the cipher is decrypted and the data is returned to its original value or state. Each time one desires to encrypt data, a key from the 72,000,000,000,000,000 possible key variations, is randomly produced, and used to encrypt the data. The same key must be made known to the receiver if they ar...
Wireless security is a complex field, but employing a few simple defenses will leave a network far safer against attackers. A wireless local area network (WLAN) is a local area network using high-frequency radio signals to wirelessly connect two or more devices, often to the internet via a wireless access point within a limited geographical area. The millions of WLANs all across the world can be found in homes, coffee shops, and even in international enterprises. Most of the WLANs deployed today are based on the IEEE 802.11 standards for wireless networks. A group known as the Wi-Fi Alliance created the Wireless Fidelity (Wi-Fi) trademark to brand products operating inside a WLAN with the 802.11 IEEE standards.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Since the invention of the cell phones, in 1973, it has quickly become the most popular device used especially today during the twenty-first century. Due to its hands-free-easy-to-use design, the amount of people that own a cell phone is rapidly increasing. The useful text messaging feature has proved to be extremely useful in current times. Along with these helpful features, the cell phone is easily accessible and more portable. The majority of phone companies offer a 3G or 4G data plan, meaning internet access can be found on your phone almost anywhere, at any time. In addition to its easy portability, the cell phone is a very useful and helpful device, allowing one to stay connected to the outer world. “With a smartphone, you can connect to the Web from virtually anywhere. You ...