Scroll down for Match your questions with Sample
Note- Students need to make Changes before uploading for Avoid similarity issue in turnitin.
0-30% Similarity in turnitin
Price is 700 per assignment
Unique assignment buy via WhatsApp 8755555879
|PROGRAM||MASTER OF COMPUTER APPLICATION (MCA)|
|course CODE & NAME||DCA8143 – Cryptography and Network Security|
|nUMBER OF ASSIGNMENTS & Marks||02
30 Marks each
Assignment Set – 1
- Discuss the five X.800 security services.
X.800 divides security services into five categories. They are:
- Access control
Its Half solved only
Buy Complete from our online store
MUJ Fully solved assignment available for session March 2023.
Lowest price guarantee with quality.
Charges INR 200 only per assignment. For more information you can get via mail or Whats app also
Mail id is email@example.com
Our website www.smuassignment.in
After mail, we will reply you instant or maximum
Otherwise you can also contact on our
whatsapp no 8791490301.
- a. What is Symmetric-key cryptography?
The sender and receiver share the same key in the symmetric-key cryptography encryption method. A single key is used for both encryption and decryption. The sender uses the key (or some set of rules) to encrypt the plaintext and sends this ciphertext to the receiver. The receiver uses the same key (or group of rules) to decrypt the message so that they can recover the
2 b. Use Caesar cipher and Monoalphabetic cipher with key =15 to encrypt the message “Hello”.
The Caesar Cipher and the Monoalphabetic Cipher are simple and well-known techniques of symmetric key algorithms which fall under the category of substitution ciphers. Both the techniques replace each letter in the plaintext by a letter with a fixed number of positions down the alphabet.
The key in these
- Discuss Double DES. What are the weaknesses of DES?
The Data Encryption Standard (DES) was developed in the 1970s by IBM, later adopted by the National Bureau of Standards (now the National Institute of Standards and Technology – NIST) as a standard encryption method. It uses a 64-bit block size and a 56-bit key. With advancements in computational power,
Assignment Set – 2
- Discuss the RSA algorithm and encrypt plaintext 12 using the p=7,q=11.
The RSA (Rivest–Shamir–Adleman) algorithm is a widely adopted public-key cryptographic algorithm used to encrypt and decrypt sensitive data. Named after its creators (Ron Rivest, Adi Shamir, and
- What do you mean by digital signature? What is Birthday Attack on Digital Signatures? Explain.
A digital signature is a mathematical scheme for verifying the authenticity of a digital document or software. In simpler terms, it’s the digital equivalent of a handwritten signature or stamped seal, but it offers far superior inherent security. A digital signature confirms that the information originated from the stated sender (authentication) and hasn’t been tampered with in transit (integrity).
- Write detailed notes on:
Internet Protocol Security (IPsec)
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the