Name: Josie C. Cesista Bsit 3N Student No.: Warm Up Activity

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

[Type text]

[Type text]

Certificate No. AJA19-0226


NAME: JOSIE C. CESISTA BSIT 3N
STUDENT NO.

WARM UP ACTIVITY

D I A G R A M
1. 1
O

E I

D N C E

U F R N

R O Y C

V I G E N E R E C I P H E R

M T Y

A A P

P L A I N T E X T N T

I A I

O L O

N Y N
K E
S

S E C R E T

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226

EXERCISE 7:

Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and concisely.
Please observe correct grammar.

A.

1. Describe the different categories of symmetric encryption algorithms.


Asymmetric encryption: in this encryption two different keys are used namely
public key and private key.
ANSWER: Sender used his own private key to encrypt the data, receiver use sender public key to
decrypt the data.

Different categories of asymmetric encryption:

1. Rivest-shamir-adleman (RSA) algorithm

2. Diffie-hellman algorithm

3. Elliptic curve

RSA algorithm:

In RSA algorithm, private key and private key both are consisting numbers because these
numbers should generated by large prime numbers. These large prime numbers perform modular
operations to produce the public key and private key.

Diffie-hellman algorithm:

In diffie-hellman algorithm shared secret key is the main aspect. Every participant performs
multiplication operation with their private key and other's public key to produce the shared secret
key.

Elliptic cureve:

Elliptic curve is similar to the diffie-hellman algorithm. Shared secret key, every participant
multiplying secret key with the other's published product.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226

2.Outline the symmetric encryption process and explain the components involved
in the process.
ANSWER: The process which involved in symmetric encryption is first the user process the plain
text in which we apply secret key and algorithm and then cipher text is produces after this the
cipher text data is send to the receiver in which he decrypt the data by using the same secret key
which the user has used and retrieves ...

3.What is cryptanalysis? Give an example of a cryptanalytic problem.


ANSWER: Cryptanalysis refers to the process of analyzing information systems in order to
understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security
systems and gain access to the contents of encrypted messages, even if the cryptographic key is
unknown.Other types of cryptanalytic attacks can include techniques for convincing individuals
to reveal their passwords or encryption keys, developing Trojan horse programs that steal secret
keys from victims' computers and send them back to the cryptanalyst, or tricking a victim into
using a weakened cryptosystem.

B. Look for the following topics on the internet:

1.The Data Encryption Standard under computer-based encryption.


ANSWER: The data encryption standard (DES) defined by US NIST performs encryption
in hardware thereby speeding up the encryption and decryption operation. Additional
features of DES are: 1. ... A unique 56-bit key is used to encrypt each block of plaintext
into a 64-bit block of ciphertext.

2. The Advanced Encryption Standard.


ANSWER: The Advanced Encryption Standard (AES) is a symmetric block cipher chosen
by the U.S. government to protect classified information. AES is implemented in software
and hardware throughout the world to encrypt sensitive data. It is essential for
government computer security, cybersecurity and electronic data protection.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


3.The Effects of Ciphertext Errors.
ANSWER: A single bit error in a ciphertext block affects the decryption of all subsequent
blocks. Rearrangement of the order of the ciphertext blocks, for example, can cause the
decryption process to become corrupted.

4.File Encryption Software.


ANSWER: Is a software that uses cryptology in order to prevent unauthorized access to
sensitive data. The software helps to streamline the movement of data, keeps the content
of your files secure, and eliminates the need for using alternative vulnerable methods.

5. Digital Rights Management under Encrypting Files.


ANSWER: Encryption or digital rights management technology (DRM) can be used to
control access to information. ... DRM and encryption may be beneficial when
information is highly confidential, or if intellectual property is involved, but risks
accompany their use.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226

Warm Up Activity (Word Search)


*REKEYING
*CRYPTONETS
*SIGNATURE
*CUTE
*CRYTO PERIOD

E C B Y C U T E S K F D O P S
G V R S T E K N Y E S N Q K I
N X U Y R I Y F R B E R C L G
I Q L C P Z R L H W Z A C N N
Y I E F N T Y G A V T L T R A
E S V F M K O Y E T Z Y W X T
K U W K R U H N A T H M Q L U
E B Y I J A E Y E Y N H X X R
R G J Z S T A K W T T I D P E
J A Z H K D I N R X S I C H S
G A B Y H Y E K C I L B U P S
X O A T U U P C K N X U R J B
P C R Y P T O P E R I O D S O
T I C O D D R L P L S W A F R
B I V N T J C V W I Q F A C O

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226

EXERCISE 8

1.If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or
larger) passphrase?
ANSWER: Hashing is the function, where arbitrary length input message is converted
into the fixed length output. User should have larger passphrase to produce the enough
entropy. ... Therefore, user should use 20-byte or larger passphrase to produce the 16-byte
entropy key.

2.Explain the reused key stream problem.


: Reused key stream is the concept that uses same key in multiple times to encrypt the
data. That is same key is used to encrypt the different messages. ... Then intruder easily
decrypt the messages, which are transmitted later.

3.Describe the role of the nonce in preventing reused key streams when using the
same passphrase to encrypt different files.
ANSWER: Nonce is used in the file' header and nonce combined with the passphrase.
That can create a high random key. This random key should generate each time of
encryption of the file.

4.Describe how key wrapping may be applied to file encryption.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


ANSWER: Key wrapping is the technique, that encrypts the key itself using the
passphrase. ... KEK is used to produce the passphrase. When CEK is encrypted with the
KEK, then wrapped key is produced.

EXERCISE 9

Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and
concisely and please observe correct grammar.

1.Explain the difference between file encryption and volume encryption.


ANSWER: File encryption is just that one file at a time rather slow and unnecessary with
VeraCrypt unless it's so sensitive a file that the NSA is actively looking for it. Volume
encryption is just what it sounds like. Encrypt a volume and anything stored in it is
encrypted with the volume as a whole.

2.Explain the fundamental difference between block and stream ciphers.


ANSWER: The main difference between a Block cipher and a Stream cipher is that a
block cipher converts the plain text into cipher text by taking plain text's block at a
time. ... Stream Cipher Converts the plain text into cipher text by taking 1 byte of plain
text at a time. 2.

3.Describe the steps performed in a typical block cipher.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


ANSWER: Divide the key schedule into subsections, one per round. - For each
subsection, perform a round: For the first round, take the plaintext as the input text; for
the remaining rounds, take the output of the previous round as the input text.

4.What is a drive controller (look on the internet)?


ANSWER: The disk controller is the controller circuit which enables the CPU to
communicate with a hard disk, floppy disk or other kind of disk drive. It also provides an
interface between the disk drive and the bus connecting it to the rest of the system.

5.What is drive locking and unlocking (look on the internet)?


ANSWER: Predator, a free Windows program, turns your USB drive into a key that locks
your computer when it's removed. To unlock your computer, you'll have to plug the USB
drive back in. (Talk about having secret-agent-style security.)
Anyone who attempts to access your computer without the USB flash drive will be hit
with an epic "Access Denied" message. To get started, follow this guide:
Step 1: Download and install Predator.
Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the
drive will be deleted or altered in any way, so feel free to use your primary
thumbdrive.When you insert the drive, a dialog box will appear asking you to create a
password. Click OK to continue.
Step 3: In the Preferences window, take note of a few key settings. First, enter a secure,
unique password in the "New password" field. If you lose your USB drive, you'll use it to
unlock your computer.If you'd like, you can check the Always Required box and you'll be
asked to enter the password each time you use your thumbdrive to unlock your PC.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


Finally, in the section under Flash Drives, ensure that the correct USB flash drive is
selected. When you're done, click "Create key" and then OK

Warm Up Activity
Across
*EMAIL
*EMAIL PROTOCOL
*INTERNET
Down
*CLOUD SERVICE
*DELIVERY

E M A I L

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


S

E M A I L P R O T O C O L

V D

I N T E R N E T

C L

E I

EXERCISE 14

Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly and
concisely and please observe correct grammar.

1.Describe the structure of an email message. Identify typical header fields. How
does the format mark the end of a message’s regular headers?
ANSWER: A message begins with several headers, which are formatted lines beginning
with a header identifier, followed by a colon and a space, followed by the contents of the
header. Many standard header identifiers are specified in RFC 822 and follow-up RFCs.
Any other header used for non-standard purposes may be created of the form X-
headername:After the headers comes a blank line, followed by the message body (which
doesn’t concern us).Your E-mail software, by default, will only display a subset of the
headers found in a typical message, because the rest aren’t normally important to you. In

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


order to figure out where a message came from, however, you need to look at the
Received: headers.

2.Explain the purpose and use of MIME in an email message.


ANSWER: The MIME stands for Multi-Purpose Internet Mail Extensions. As the name
indicates, it is an extension to the Internet email protocol that allows it's users to
exchange different kinds of data files over the Internet such as images, audio, and video.
The MIME is required if text in character sets other than ASCII.

3.Describe a typical strategy for formatting an email message with text features
not found in a plaintext file.

4.Explain the role of mailbox protocols.


ANSWER: Email protocol is a method by which a communication channel is established
between two computers and email is transferred between them. ... One computer sends
the mail and the other one receives it. The mail server stores the mail and lets the
receiving device access it and download it if needed.

5.Describe how all three types of network switching (message, circuit, and packet)
are used in the email system.
ANSWER: The store-and-forward switching method
In this method, the switch waits till all bits of the frame are received. After receiving all
bits of the frame, the switch verifies whether the received frame is error-free. If the
received frame is error-free, the switch forwards the frame from the selected port or ports.
If the received frame contains errors, the switch discards the frame.
To know the condition of a frame, the switch uses the FCS (frame check sequence) field of
the frame. The FCS field contains a value known as the CRC value. The CRC value allows
a receiving device to know whether the frame is exactly in the same state as the source
packed it or it has been damaged or tempered in the middle.
Can – avid 6806
Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


After creating a frame, the sender or the source device runs the CRC (Cyclic Redundancy
Check) algorithm on it. The value produced by this algorithm is known as the CRC value.
The CRC value is stored in the FCS field of the frame. After storing the CRC value, the
sender device loads the frame on the media.
Upon receiving the frame, the receiver or destination device runs the CRC algorithm on
the frame and compares the result with the CRC value stored in the FCS field of the
frame. If the result and the CRC value are the same, the frame is considered error-free. If
they are not the same, the frame is considered as the damaged frame.

store and forward method


In this method, a switch only forwards error-free frames. This method provides the
highest level of accuracy but at the cost of speed. If we compare all three methods of
switching, this method respectively stands at the first and the last positions in terms of
accuracy and speed.The cut-through switching method
In this method, the switch starts the third phase as soon as the forward port is
determined. An Ethernet frame stores the destination MAC address in the third field. To
forward a frame, a switch only needs the destination MAC address of the frame. Since the
destination MAC address occurs very early in the Ethernet frame, a switch can start
forwarding the received bits of the frame before receiving all bits of the frame.

Ethernet frame destination address


In this method, the switch does not check the condition of the frame before forwarding it.
This reduces the latency, but it also propagates errors. From all three switching methods,
this is the fastest method of switching. But it provides speed at the cost of having
forwarded some frames that contain errors.cut and through switching method
The fragment-free switching method
In this method, after determining the forward port, the switch waits till the first 64 bytes
of the frame are received. The 64 bytes is the minimum legal size of an Ethernet frame.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph
[Type text]
[Type text]

Certificate No. AJA19-0226


An Ethernet frame that is smaller than 64 bytes is known as the runt frame. A runt frame
is a corrupt frame.

fragment-free switching method


This method is the modified version of the cut-through switching method. This method
reduces the number of runt frames that are being switched. Sometimes this method is
also known as the modified cut-through or runtless switching method.

Can – avid 6806


Eastern Samar, Philippines
essu.canavid@gmail.com
https://essu.edu.ph

You might also like