AIAS-FinalsMorallosJanrelKent (Answer) - WPS Office
AIAS-FinalsMorallosJanrelKent (Answer) - WPS Office
AIAS-FinalsMorallosJanrelKent (Answer) - WPS Office
1. Procedure
2. Diagram
3. Information
4. Crypatanalysis
5. Encryption
6. Vigeñere Cipher
7. PlainText
8. Key
9. Secret
EXERCISE 7
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and
A.
1.codes: In this we apply transformation to words or phrases in the original text that it as single symbols
for mostly codes the key had long lists of phrases and its code value which indicates it.
2.ciphers:In this we transform to symbols in the raw text itself it further divided into two types
transposition ciphers and substitution ciphers
2. Outline the symmetric encryption process and explain the components involved in the process.
Answer: The process which involved in symmetric encryption is first the user process the plain text in
which we apply secret key and algorithm and then cipher text is produces after this the cipher text data
is send to the receiver in which he decrypt the data by using the same secret key which the user has
used and retrieves the plain text.
The components which involved in this symmetric encryption are first the secret key and then the
algorithm to execute the process and then the text data which is used to encrypted.
Answer:
Exercise 8
Answer: key management is the important aspect in cryptosystem, which is used to generating,
distributing, storing the cryptographic keys.
These cryptographic keys are used to maintain the protection to the transfer files, which is transmitted
from one to another.
• The main aim for this key management is to distribute the keys to the authorized people only, don't
distribute to the unauthorized people.
• Generate the keys, which is can't guess by the intruder. For example, in RSA algorithm large prime
numbers should be chosen to generate the keys.
• The last challenge of the key management is maintain the key integrity. That is intruder shouldn't
intercept those keys.
2. If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or
larger) passphrase?
Answer: Hashing is the function, where arbitrary length input message is converted into the fixed length
output. User should have larger passphrase to produce the enough entropy. One-way hash function
hashes this passphrase to produce the entropy.Binary generates more entropy than text, so to get a
hard trial and error key you would have to use a larger passphrase. Therefore, user should use 20-byte
or larger passphrase to produce the 16-byte entropy key.
Answer: Reused key stream: Reused key stream is the concept that uses same key in multiple times to
encrypt the data. That is same key is used to encrypt the different messages.
When a key is used in multiple times to encrypt the message, this is should allow the intruder to
penetrate the key or key stream. Then intruder easily decrypt the messages, which are transmitted later.
Therefore, in order to protect the file the keys shouldn't use more than once.
4. Describe the role of the nonce in preventing reused key streams when using the
Answer: There are two blocks used in file's header in order to design the internal key for the file or
message,
Hashing is the function, which is converted the arbitrary length message into fixed length message.
Nonce:
Nonce is used in the file' header and nonce combined with the passphrase. That can create a high
random key. This random key should generate each time of encryption of the file.
Advantage of nonce:
Nonce shouldn't repeat itself. If same passphrase used to bind the message, then nonce will generate a
new key.
Answer: Key wrapping is the technique, that encrypts the key itself using the passphrase. Key wrapping
is used two types of keys to encrypt the file.
CEK:
KEK:
When CEK is encrypted with the KEK, then wrapped key is produced.
• Encrypt the CEK and KEK, in order to produce the wrapping key.
• Encrypt the file using CEK
Exercise 9
Answer: File encryption means converting a data into a secret code. In order to read this converted file,
this needs a key or password to decrypt it. Volume encryption means encrypting all files in the volume.
Answer: The main difference between Block cipher and Stream cipher is that block cipher converts
converts the plain text into cipher text by taking plain text's block at a time. While stream cipher
Converts the plain text into cipher text by taking 1 byte of plain text at a time. ... While stream cipher
uses 8 bits.
Answer: Divide the key schedule into subsections, one per round. - For each subsection, perform a
round: For the first round, take the plaintext as the input text; for the remaining rounds, take the output
of the previous round as the input text.
Answer: If you’re working on a document and have to leave your computer for a little while, you can
protect your work by “locking” your computer. Locking your computer keeps your files safe while you
are away from your computer. A locked computer hides and protects programs and documents, and will
allow only the person who locked the computer to unlock it again. You unlock your computer by logging
in again.
1.
2.
3.
4.
5.
EXERCISE 14
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and concisely
1. Describe the structure of an email message. Identify typical header fields. How does
Answer: The MIME stands for Multi-Purpose Internet Mail Extensions. As the name indicates, it is an
extension to the Internet email protocol that allows it's users to exchange different kinds of data files
over the Internet such as images, audio, and video.
3. Describe a typical strategy for formatting an email message with text features not found
in a plaintext file.
Answer:
Answer:
5. Describe how all three types of network switching (message, circuit, and packet) are
Answer: