This assignment document outlines 22 tasks related to cryptography and cybersecurity concepts. It includes explaining key terms, encryption algorithms like DES, AES, RSA, and Hill Cipher, hash functions, digital signatures, public key infrastructure concepts like certificates and Kerberos, and attacks like birthday attacks. It also tasks comparing authentication and authorization, explaining key exchange and distribution techniques, and discussing encryption modes like electronic codebook. The document provides a comprehensive overview of foundational cryptography and security topics.
Original Description:
Assignment of Gtu University for Internet Security
This assignment document outlines 22 tasks related to cryptography and cybersecurity concepts. It includes explaining key terms, encryption algorithms like DES, AES, RSA, and Hill Cipher, hash functions, digital signatures, public key infrastructure concepts like certificates and Kerberos, and attacks like birthday attacks. It also tasks comparing authentication and authorization, explaining key exchange and distribution techniques, and discussing encryption modes like electronic codebook. The document provides a comprehensive overview of foundational cryptography and security topics.
This assignment document outlines 22 tasks related to cryptography and cybersecurity concepts. It includes explaining key terms, encryption algorithms like DES, AES, RSA, and Hill Cipher, hash functions, digital signatures, public key infrastructure concepts like certificates and Kerberos, and attacks like birthday attacks. It also tasks comparing authentication and authorization, explaining key exchange and distribution techniques, and discussing encryption modes like electronic codebook. The document provides a comprehensive overview of foundational cryptography and security topics.
1 Explain following terms: non-repudiation, integrity, confidentiality, authentication.
2 Discuss the different techniques for public key distribution. 3 Define: Security attack, security mechanism, security service. 4 Explain the following properties of the hash function: One way property and weak collision resistance 5 Explain the playfair cipher. Encrypt the plain text message: ‘SECRETMESSEGE’ using key ‘KEYWORD’ 6 Discuss Electronic code book mode in detail. 7 Explain DES encryption with neat sketches. 8 Explain AES encryption with neat sketches 9 Encrypt the message ‘ATTACK’ using Hill cipher with key ‘VIEW’. 10 Define: Cryptography, Cryptanalysis, Brute-force attack. 11 Explain RSA algorithm in detail. Perform encryption and decryption using RSA algorithm for prime numbers p=3 and q=11, plaintext message m=2 12 List and explain various types of attacks. 13 Compare authentication and authorization. 14 Explain digital signature algorithm. 15 Explain pre-image resistance and second pre-image resistance. 16 Write difference between conventional encryption and public-key encryption 17 Explain Diffie Hellman key exchange algorithm with example. 18 Discuss X.509 Certificates. 19 Explain Kerberos in detail 20 Discuss Secure Hash Algorithm (SHA) 21 What is KDC? Explain how KDC do key distribution with diagram. 22 Write a short note on Birthday attack.