MCA DCA8143 CRYPTOGRAPHY AND NETWORK SECURITY

Sale!

200.00

Scroll down for Match your  questions with Sample

Note- Students need to make Changes before uploading for Avoid similarity issue in turnitin.

Another Option

UNIQUE ASSIGNMENT

0-30% Similarity in turnitin

Price is 700 per assignment

Unique assignment buy via WhatsApp   8755555879

Quick Checkout
Categories: , , Tag:

Description

SESSION MAY 2023
PROGRAM MASTER OF COMPUTER APPLICATION (MCA)
SEMESTER III
course CODE & NAME DCA8143 – Cryptography and Network Security
CREDITS 4
nUMBER OF ASSIGNMENTS & Marks 02

30 Marks each

 

Assignment Set – 1

 

  1. Discuss the five X.800 security services.

Ans 1.

X.800 divides security services into five categories. They are:

  1. Authentication
  2. Access control
  3. Data

Its Half solved only

Buy Complete from our online store

 

https://smuassignment.in/online-store/

 

MUJ Fully solved assignment available for session March  2023.

 

Lowest price guarantee with quality.

Charges INR 200 only per assignment. For more information you can get via mail or Whats app also

Mail id is aapkieducation@gmail.com

 

Our website www.smuassignment.in

After mail, we will reply you instant or maximum

1 hour.

Otherwise you can also contact on our

whatsapp no 8791490301.

 

 

  1. a. What is Symmetric-key cryptography?

Ans 2a.

The sender and receiver share the same key in the symmetric-key cryptography encryption method. A single key is used for both encryption and decryption. The sender uses the key (or some set of rules) to encrypt the plaintext and sends this ciphertext to the receiver. The receiver uses the same key (or group of rules) to decrypt the message so that they can recover the

 

2  b. Use Caesar cipher and Monoalphabetic cipher with key =15 to encrypt the message “Hello”.

Ans 2b.

The Caesar Cipher and the Monoalphabetic Cipher are simple and well-known techniques of symmetric key algorithms which fall under the category of substitution ciphers. Both the techniques replace each letter in the plaintext by a letter with a fixed number of positions down the alphabet.

The key in these

 

  1. Discuss Double DES. What are the weaknesses of DES?

Ans 3.

The Data Encryption Standard (DES) was developed in the 1970s by IBM, later adopted by the National Bureau of Standards (now the National Institute of Standards and Technology – NIST) as a standard encryption method. It uses a 64-bit block size and a 56-bit key. With advancements in computational power,

 

 

Assignment Set – 2

 

  1. Discuss the RSA algorithm and encrypt plaintext 12 using the p=7,q=11.

Ans 2.

RSA algorithm

The RSA (Rivest–Shamir–Adleman) algorithm is a widely adopted public-key cryptographic algorithm used to encrypt and decrypt sensitive data. Named after its creators (Ron Rivest, Adi Shamir, and

 

  1. What do you mean by digital signature? What is Birthday Attack on Digital Signatures? Explain.

Ans 5.

Digital signature

A digital signature is a mathematical scheme for verifying the authenticity of a digital document or software. In simpler terms, it’s the digital equivalent of a handwritten signature or stamped seal, but it offers far superior inherent security. A digital signature confirms that the information originated from the stated sender (authentication) and hasn’t been tampered with in transit (integrity).

Digital

  1. Write detailed notes on:

Ans 6a.

Internet Protocol Security (IPsec)

Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the