Sei sulla pagina 1di 3

1. What is Cryptology? The study of secure communications, which encompasses both cryptography and cryptanalysis. 2. Define Cryptography.

The branch of cryptology dealing with the design of algorithms for encryption and decryption, intended to ensure the secrecy and/or authenticity of messages. 3. Define Cryptanalysis . The branch of cryptology dealing with the breaking of a cipher to recover information, or forging encrypted information that will be accepted as authentic. 4. What is Plain text ? An original message is known as the plaintext(Readable format !. What is Cipher "ext# coded message is called the Cipher "ext.($nreadable format %. What is &ey? A sequence of symbols that controls the operation of a cryptographic transformation. A key is normally a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa. The key should be the only part of the algorithm that it is necessary to keep secret. '. What is (ymmetri) Cryptography? (ymmetri) )ryptography uses a single private key to both encrypt and decrypt data. Examples AE!/"i#ndael ,$lowfish,%A!T&,'E!,('EA,"%),"%*,"%+,!erpent,Triple 'E!,Two fish *. What is +symmetri) Cryptography? Asymmetric cryptography or public,key cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message .The keys used are public and private key. ,. Define (tream )ipher. -rocesses the input stream continuously and producing one element at a time. Example caeser cipher. 1-. Define .lo)/ )ipher. -rocesses the input one block of elements at a time producing an output block for each input block. Example 'E!. 11. What is Passi0e atta)/? .onitoring the message during transmission. Eg (nterception

12.What is +)ti0e atta)/#.odification of data stream or creation of false data stream. E.g. /abrication, .odification, and (nterruption 13. 1ist the different "ypes of Ciphers. caeser %iphers. 0igenere %ipher !ubstitution %iphers -layfair $lock ciphers 1ne,Time pads 14. Write short notes Congr2en)e. 2et a,b,n be integers with n34. 5e say that a 6 b7mod n8 (f a,b is a multiple of n. 1!. Write short notes Chinese Remainder "heorem# !uppose gcd7m,n89:.;iven integers a and b, there exists exactly one solution x7mod mn8 to the simultaneous congruence x 6 a7mod n8 , x 6 b7mod n8. 1%. Write short notes 3od2lar 4xponentiation# a .odular exponentition is of the form x 7mod n8. 1'. Write short notes 5ermat6s 1ittle "heorem# (f p is aprime and p does not p,: divide a, then a 6 : 7mod p8 1*.Write short notes 42ler6s "heorem# (f gcd7a,n89:, then a<7n8 6 :7mod n8 1,. Define integrity and nonrep2diation? 7ntegrity#!ervice that ensures that only authori=ed person able to modify the message. 8onrep2diation#This service helps to prove that the person who denies the transaction is true or false. 2-. Define )onfidentiality and a2thenti)ation Confidentiality# (t means how to maintain the secrecy of message. (t ensures that the information in a computer system and transmitted information are accessible only for reading by authori=ed person. +2thenti)ation# (t helps to prove that the source entity only has involved the transaction. 21. What is +0alan)he effe)t? A characteristic of an encryption algorithm in which a small change in the plaintext or key gives rise to a large change in the cipher text.

:. ). >. 4.

Explain in detail about any four substitution techniques Explain in detail about OSI Security Architecture? Explain playfair cipher & vernam cipher in detail ? Explain briefly about data encryption standard & types of attac s on double &!riple"ES

Potrebbero piacerti anche