Professional Documents
Culture Documents
Name: Josie C. Cesista Bsit 3N Student No.: Warm Up Activity
Name: Josie C. Cesista Bsit 3N Student No.: Warm Up Activity
Name: Josie C. Cesista Bsit 3N Student No.: Warm Up Activity
[Type text]
WARM UP ACTIVITY
D I A G R A M
1. 1
O
E I
D N C E
U F R N
R O Y C
V I G E N E R E C I P H E R
M T Y
A A P
P L A I N T E X T N T
I A I
O L O
N Y N
K E
S
S E C R E T
EXERCISE 7:
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and concisely.
Please observe correct grammar.
A.
2. Diffie-hellman algorithm
3. Elliptic curve
RSA algorithm:
In RSA algorithm, private key and private key both are consisting numbers because these
numbers should generated by large prime numbers. These large prime numbers perform modular
operations to produce the public key and private key.
Diffie-hellman algorithm:
In diffie-hellman algorithm shared secret key is the main aspect. Every participant performs
multiplication operation with their private key and other's public key to produce the shared secret
key.
Elliptic cureve:
Elliptic curve is similar to the diffie-hellman algorithm. Shared secret key, every participant
multiplying secret key with the other's published product.
2.Outline the symmetric encryption process and explain the components involved
in the process.
ANSWER: The process which involved in symmetric encryption is first the user process the plain
text in which we apply secret key and algorithm and then cipher text is produces after this the
cipher text data is send to the receiver in which he decrypt the data by using the same secret key
which the user has used and retrieves ...
E C B Y C U T E S K F D O P S
G V R S T E K N Y E S N Q K I
N X U Y R I Y F R B E R C L G
I Q L C P Z R L H W Z A C N N
Y I E F N T Y G A V T L T R A
E S V F M K O Y E T Z Y W X T
K U W K R U H N A T H M Q L U
E B Y I J A E Y E Y N H X X R
R G J Z S T A K W T T I D P E
J A Z H K D I N R X S I C H S
G A B Y H Y E K C I L B U P S
X O A T U U P C K N X U R J B
P C R Y P T O P E R I O D S O
T I C O D D R L P L S W A F R
B I V N T J C V W I Q F A C O
EXERCISE 8
1.If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or
larger) passphrase?
ANSWER: Hashing is the function, where arbitrary length input message is converted
into the fixed length output. User should have larger passphrase to produce the enough
entropy. ... Therefore, user should use 20-byte or larger passphrase to produce the 16-byte
entropy key.
3.Describe the role of the nonce in preventing reused key streams when using the
same passphrase to encrypt different files.
ANSWER: Nonce is used in the file' header and nonce combined with the passphrase.
That can create a high random key. This random key should generate each time of
encryption of the file.
EXERCISE 9
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and
concisely and please observe correct grammar.
Warm Up Activity
Across
*EMAIL
*EMAIL PROTOCOL
*INTERNET
Down
*CLOUD SERVICE
*DELIVERY
E M A I L
E M A I L P R O T O C O L
V D
I N T E R N E T
C L
E I
EXERCISE 14
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and
concisely and please observe correct grammar.
1.Describe the structure of an email message. Identify typical header fields. How
does the format mark the end of a message’s regular headers?
ANSWER: A message begins with several headers, which are formatted lines beginning
with a header identifier, followed by a colon and a space, followed by the contents of the
header. Many standard header identifiers are specified in RFC 822 and follow-up RFCs.
Any other header used for non-standard purposes may be created of the form X-
headername:After the headers comes a blank line, followed by the message body (which
doesn’t concern us).Your E-mail software, by default, will only display a subset of the
headers found in a typical message, because the rest aren’t normally important to you. In
3.Describe a typical strategy for formatting an email message with text features
not found in a plaintext file.
5.Describe how all three types of network switching (message, circuit, and packet)
are used in the email system.
ANSWER: The store-and-forward switching method
In this method, the switch waits till all bits of the frame are received. After receiving all
bits of the frame, the switch verifies whether the received frame is error-free. If the
received frame is error-free, the switch forwards the frame from the selected port or ports.
If the received frame contains errors, the switch discards the frame.
To know the condition of a frame, the switch uses the FCS (frame check sequence) field of
the frame. The FCS field contains a value known as the CRC value. The CRC value allows
a receiving device to know whether the frame is exactly in the same state as the source
packed it or it has been damaged or tempered in the middle.
Can – avid 6806
Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]