Professional Documents
Culture Documents
1|Page
v. A special file provides a universal interface for hardware devices (and virtual
devices created and used by the kernel), because tools for file I/O can access the
device.
vi. When data is red from or written to a special file, the operation happens
immediately, and is not subject to conventional file system rules
Disadvantage
i. It may have security bridge
ii. It may give access for third party software and they may exploit the security
3. Explain the difference between statistical anomaly intrusion detection and rule-
based intrusion detection?
Statistical anomaly detection involves the collection of data relating to the behavior
of legitimate users over a period of time. Then statistical tests are applied to
observed behavior to determine with a high level of confidence whether that
behavior is not legitimate user behavior.
Rule-Based Detection involves an attempt to define a set of rules that can be used to
decide that a given behavior is that of an intruder.
2|Page
ii. Whereas the public key testing has a long-term view and checks the
sustainability of the system
To put it in simple terms, the major difference between symmetric and asymmetric
cryptography is in the key used by the sender and the receiver. If both use the same
key for transmission and receiver, then it is Symmetric key cryptography and if they
use different keys then it is called asymmetric key cryptography.
AES DES
3|Page
AES stands for Advanced Encryption Standard DES stands for Data Encryption Standard
Byte-Oriented Bit-Oriented
Key length can be 128-bits, 192-bits, and 256-bits. The key length is 56 bits in DES.
Number of rounds depends on key length: 10(128- DES involves 16 rounds of identical operations
bits), 12(192-bits), or 14(256-bits) The structure is based on a Feistel network
The structure is based on a substitution- The design rationale for DES is closed.
permutation network The selection process for this is secret
The design rationale for AES is open DES can be broken easily as it has known
The selection process for this is secret but vulnerabilities. 3DES (Triple DES) is a variation of DES
accepted open public comment which is secure than the usual DES
AES is more secure than the DES cipher and is the The rounds in DES are: Expansion, XOR operation with
de facto world standard round key, Substitution and Permutation
The rounds in AES are: Byte Substitution, Shift DES can encrypt 64 bits of plaintext.
Row, Mix Column and Key Addition DES cipher is derived from Lucifer cipher
AES can encrypt 128 bits of plaintext Known attacks against DES include Brute-force, Linear
AES cipher is derived from an aside-channel crypt-analysis, and Differential crypt-analysis
square cipher
No known crypt-analytical attacks against AES
but side channel attacks against AES
implementations possible. Biclique attacks have
better complexity than brute force but still
ineffective
4|Page