1. What would be the transformation of a message 'We the people of
India' using the Rail Fence Technique? Ans) WHEE IETEPOL FIDA PON
2. What is symmetric and asymmetric key algorithm?
Ans) Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key.
3. Explain active attack and passive attack with examples.
Ans) An Active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. Viruses, worms, malware, Denial of Service attacks, and password crackers are all examples of active cyber-attacks.
A Passive attack attempts to learn or make use of information
from the system but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the opponent is to obtain information is being transmitted.
a. Tapping. Monitoring unencrypted communications such as
emails or telephone calls. b. Encryption. Intercepting encrypted information flows and trying to break the encryption. c. Scanning. Scanning a device connected to the internet for vulnerabilities such as open ports or a weak operating system version. d. Traffic Analysis. CRYPTOGRAPHY AND NETWORK SECURITY ASSIGNMENT
Submitted by: SOUVIK BANERJEE C SE 4 TH Y EA R ROLL-11200116026