Professional Documents
Culture Documents
MAKEUP CAT
1. Explain the following classes of attacks on computer systems. For each state a suitable
exaple.
i. Known key attack
ii. Known plaintext attack
iii. Choosen ciphertext attack. [3 Marks]
2. Distinguish between digital certificates and encryption and briefly explain how they can be
used to improve computer security. [3 Marks]
6. Explain how the HILL cipher algorithm works. You may use the plaintext PLAY to and the
key SECRET to show its encipherment procedure. [5 Marks]
7. Distinguish between provable and unconditional security as models for evaluating security.
[3 Marks]