Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Information,Network and Security

Rating
-
Sold
-
Pages
6
Uploaded on
10-12-2022
Written in
2022/2023

Information,Network and Security notes. This full document is all you need to nail any exam or test related to his subject

Institution
Course

Content preview

INFORMATION NETWORK AND SECURITY - PART 1


Q. Define block cipher?

A. A block cipher is a method of encrypting data in blocks to produce ciphertext
using a cryptographic key and algorithm.



Q. What is Fiestel cipher?

A. The Feistel cipher is a design model or structure used to build various
symmetric block ciphers, such as DES.



Q. List out any two virus countermeasures.

A. personal firewalls.

application firewalls.

anti-virus software.

pop-up blockers.



Q. List out the functions used for rounds of AES?

A. (1) byte substitution, (2) shift rows, (3) mix columns, and (4) add round key.



Q. Define Honeypot.

A. In computer terminology, a honeypot is a computer security mechanism set to
detect, deflect, or counteract attempts at unauthorized use of information
systems

1

, Q. List and explain different categories of security services

A. Message Confidentiality − The principle of confidentiality defines that only the
sender and the intended recipient should be capable to create the element of the
message. It protects the transmitted data from passive attack.

‌ onnection Confidentiality − The protection of all user information on a
C
connection.

‌ onnectionless Confidentiality − The security of all user data in an individual data
C
block.

T‌ raffic-flow Confidentiality − The protection of the information that can be
derived from observation of traffic flows.

‌ ccess Control − The principle of access control decides who should be capable to
A
access information or system through communication link. It supports the
avoidance of unauthorized use of a resource



Q. Explain Vigenere cipher giving proper example.

A. Vigenere Cipher is an encryption and decryption algorithm. It is a type of
polyalphabetic substitution cipher, which means that the cipher alphabet is
changed regularly during the encryption process. Due to this, the cipher becomes
less vulnerable to cryptanalysis.The Vigenere Cipher was developed in 1585 by
Blaise de Vigenere. He used a Vigenere table or square to encode messages.

Input : Plaintext : GEEKSFORGEEKS

Keyword : AYUSH

Output : Ciphertext : GCYCZFMLYLEIM

For generating key, the given keyword is repeated


2

Written for

Institution
Course

Document information

Uploaded on
December 10, 2022
Number of pages
6
Written in
2022/2023
Type
Class notes
Professor(s)
Haider zaidi
Contains
All classes

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
danishsherkhan

Get to know the seller

Seller avatar
danishsherkhan Rizvi college of arts ,science and commerce
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
3
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions