You are on page 1of 2

Cryptography and Network Security

1. What would be the transformation of a message 'We the people of


India' using the Rail Fence Technique?
Ans) WHEE IETEPOL FIDA PON

2. What is symmetric and asymmetric key algorithm?


Ans) Symmetric encryption is a type of encryption where only
one key (a secret key) is used to both encrypt and decrypt
electronic information. The entities communicating via symmetric
encryption must exchange the key so that it can be used in the
decryption process.
Asymmetric cryptography, also known as public key
cryptography, uses public and private keys to encrypt and decrypt
data. The keys are simply large numbers that have been paired
together but are not identical (asymmetric). One key in the pair
can be shared with everyone; it is called the public key.

3. Explain active attack and passive attack with examples.


Ans) An Active attack is a network exploit in which a hacker
attempts to make changes to data on the target or data en route to
the target. In a masquerade attack, the intruder pretends to be a
particular user of a system to gain access or to gain greater
privileges than they are authorized for.
Viruses, worms, malware, Denial of Service attacks, and
password crackers are all examples of active cyber-attacks.

A Passive attack attempts to learn or make use of information


from the system but does not affect system resources. Passive
Attacks are in the nature of eavesdropping on or monitoring of
transmission. The goal of the opponent is to obtain information is
being transmitted.

a. Tapping. Monitoring unencrypted communications such as


emails or telephone calls.
b. Encryption. Intercepting encrypted information flows and trying
to break the encryption.
c. Scanning. Scanning a device connected to the internet for
vulnerabilities such as open ports or a weak operating system
version.
d. Traffic Analysis.
CRYPTOGRAPHY AND
NETWORK SECURITY
ASSIGNMENT

Submitted by:
SOUVIK BANERJEE
C SE 4 TH Y EA R
ROLL-11200116026

You might also like