AIAS-FinalsMorallosJanrelKent (Answer) - WPS Office

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

AIAS-Finals

Activity. Complete the crossword puzzle below,

1. Procedure

2. Diagram

3. Information

4. Crypatanalysis

5. Encryption

6. Vigeñere Cipher

7. PlainText

8. Key

9. Secret

EXERCISE 7

Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and

concisely. Please observe correct grammar.

A.

1. Describe the different categories of symmetric encryption algorithms.

Answer: two different categories

1.codes: In this we apply transformation to words or phrases in the original text that it as single symbols
for mostly codes the key had long lists of phrases and its code value which indicates it.

2.ciphers:In this we transform to symbols in the raw text itself it further divided into two types
transposition ciphers and substitution ciphers

2. Outline the symmetric encryption process and explain the components involved in the process.
Answer: The process which involved in symmetric encryption is first the user process the plain text in
which we apply secret key and algorithm and then cipher text is produces after this the cipher text data
is send to the receiver in which he decrypt the data by using the same secret key which the user has
used and retrieves the plain text.

The components which involved in this symmetric encryption are first the secret key and then the
algorithm to execute the process and then the text data which is used to encrypted.

3. What is cryptanalysis? Give an example of a cryptanalytic problem.

Answer:

Warm-Up activity (Word Search)

Exercise 8

1. Summarize the challenge of key management.

Answer: key management is the important aspect in cryptosystem, which is used to generating,
distributing, storing the cryptographic keys.

These cryptographic keys are used to maintain the protection to the transfer files, which is transmitted
from one to another.

Challenges in key management:

• The main aim for this key management is to distribute the keys to the authorized people only, don't
distribute to the unauthorized people.

• Generate the keys, which is can't guess by the intruder. For example, in RSA algorithm large prime
numbers should be chosen to generate the keys.
• The last challenge of the key management is maintain the key integrity. That is intruder shouldn't
intercept those keys.

2. If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or

larger) passphrase?

Answer: Hashing is the function, where arbitrary length input message is converted into the fixed length
output. User should have larger passphrase to produce the enough entropy. One-way hash function
hashes this passphrase to produce the entropy.Binary generates more entropy than text, so to get a
hard trial and error key you would have to use a larger passphrase. Therefore, user should use 20-byte
or larger passphrase to produce the 16-byte entropy key.

3. Explain the reused key stream problem.

Answer: Reused key stream: Reused key stream is the concept that uses same key in multiple times to
encrypt the data. That is same key is used to encrypt the different messages.

Problem with the reused key stream:

When a key is used in multiple times to encrypt the message, this is should allow the intruder to
penetrate the key or key stream. Then intruder easily decrypt the messages, which are transmitted later.

Therefore, in order to protect the file the keys shouldn't use more than once.

4. Describe the role of the nonce in preventing reused key streams when using the

same passphrase to encrypt different files.

Answer: There are two blocks used in file's header in order to design the internal key for the file or
message,

1. One way hash key and


2. Nonce

One-way hash function:

Hashing is the function, which is converted the arbitrary length message into fixed length message.

Nonce:

Nonce is used in the file' header and nonce combined with the passphrase. That can create a high
random key. This random key should generate each time of encryption of the file.

Advantage of nonce:

Nonce shouldn't repeat itself. If same passphrase used to bind the message, then nonce will generate a
new key.

5. Describe how key wrapping may be applied to file encryption.

Answer: Key wrapping is the technique, that encrypts the key itself using the passphrase. Key wrapping
is used two types of keys to encrypt the file.

1. Content encryption key (CEK) and

2. Key encrypting key (KEK)

CEK:

CEK is used to encrypt the data, which is in the file.

KEK:

KEK is used to produce the passphrase.

When CEK is encrypted with the KEK, then wrapped key is produced.

Encrypt the file using wrapped keys:

• Initially collect the passphrase from the user.

• Hash the passphrase to produce KEK

• Generate CEK using random keys

• Encrypt the CEK and KEK, in order to produce the wrapping key.
• Encrypt the file using CEK

• Again file is encrypted file by combining ciphertext and wrapped key

Exercise 9

1. Explain the difference between file encryption and volume encryption ?

Answer: File encryption means converting a data into a secret code. In order to read this converted file,
this needs a key or password to decrypt it. Volume encryption means encrypting all files in the volume.

2. Explain the fundamental difference between block and stream ciphers

Answer: The main difference between Block cipher and Stream cipher is that block cipher converts
converts the plain text into cipher text by taking plain text's block at a time. While stream cipher
Converts the plain text into cipher text by taking 1 byte of plain text at a time. ... While stream cipher
uses 8 bits.

3. Describe the steps performed in a typical block cipher.

Answer: Divide the key schedule into subsections, one per round. - For each subsection, perform a
round: For the first round, take the plaintext as the input text; for the remaining rounds, take the output
of the previous round as the input text.

4. What is a Drive controller (look on the internet)


Answer: The drive controllers manage this, and all basic mid-level disk access functions. Most personal
computer disk drives are smart enough now to do their own reading and writing and even caching of
data to speed up access.

5. What is drive locking and unlocking (look on the internet)

Answer: If you’re working on a document and have to leave your computer for a little while, you can
protect your work by “locking” your computer. Locking your computer keeps your files safe while you
are away from your computer. A locked computer hides and protects programs and documents, and will
allow only the person who locked the computer to unlock it again. You unlock your computer by logging
in again.

Warm-Up Activity complete the crossword below.

1.

2.

3.

4.

5.

EXERCISE 14

Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and concisely

and please observe correct grammar.

1. Describe the structure of an email message. Identify typical header fields. How does

the format mark the end of a message’s regular headers?


Answer:

2. Explain the purpose and use of MIME in an email message.

Answer: The MIME stands for Multi-Purpose Internet Mail Extensions. As the name indicates, it is an
extension to the Internet email protocol that allows it's users to exchange different kinds of data files
over the Internet such as images, audio, and video.

3. Describe a typical strategy for formatting an email message with text features not found

in a plaintext file.

Answer:

4. Explain the role of mailbox protocols.

Answer:

5. Describe how all three types of network switching (message, circuit, and packet) are

used in the email system.

Answer:

You might also like