Professional Documents
Culture Documents
[Type text]
WARM UP ACTIVITY
P
1. 1
D I A G R A M
E I
D N C E
U F R N
R O Y C
V I G E N E R E C I P H E R
M T Y
A A P
P L A I N T E X T N T
I A I
O L O
N Y N
K E
S
S E C R E T
EXERCISE 7:
A.
1. Describe the different categories of symmetric encryption algorithms.
Asymmetric encryption: in this encryption two different keys are used namely
public key and private key.
ANSWER: Sender used his own private key to encrypt the data, receiver use sender public key
to decrypt the data.
RSA algorithm:
In RSA algorithm, private key and private key both are consisting numbers because these
numbers should generated by large prime numbers. These large prime numbers perform
modular operations to produce the public key and private key.
Diffie-hellman algorithm:
In diffie-hellman algorithm shared secret key is the main aspect. Every participant performs
multiplication operation with their private key and other's public key to produce the shared
secret key.
Elliptic cureve:
Elliptic curve is similar to the diffie-hellman algorithm. Shared secret key, every participant
multiplying secret key with the other's published product.
2.Outline the symmetric encryption process and explain the components involved
in the process.
ANSWER: The process which involved in symmetric encryption is first the user process the
plain text in which we apply secret key and algorithm and then cipher text is produces after this
the cipher text data is send to the receiver in which he decrypt the data by using the same
secret key which the user has used and retrieves ...
E C B Y C U T E S K F D O P S
G V R S T E K N Y E S N Q K I
N X U Y R I Y F R B E R C L G
I Q L C P Z R L H W Z A C N N
Y I E F N T Y G A V T L T R A
E S V F M K O Y E T Z Y W X T
K U W K R U H N A T H M Q L U
E B Y I J A E Y E Y N H X X R
R G J Z S T A K W T T I D P E
J A Z H K D I N R X S I C H S
G A B Y H Y E K C I L B U P S
X O A T U U P C K N X U R J B
P C R Y P T O P E R I O D S O
T I C O D D R L P L S W A F R
B I V N T J C V W I Q F A C O
EXERCISE 8
These cryptographic keys are used to maintain the protection to the transfer files, which is
transmitted from one to another.
• The main aim for this key management is to distribute the keys to the authorized people
only, don't distribute to the unauthorized people.
• Generate the keys, which is can't guess by the intruder. For example, in RSA algorithm
large prime numbers should be chosen to generate the keys.
• The last challenge of the key management is maintain the key integrity. That is intruder
shouldn't intercept those keys.
2.If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or
larger) passphrase?
ANSWER: Hashing is the function, where arbitrary length input message is converted into the
fixed length output. User should have larger passphrase to produce the enough entropy. ...
Therefore, user should use 20-byte or larger passphrase to produce the 16-byte entropy key.
4.Describe the role of the nonce in preventing reused key streams when using the
same passphrase to encrypt different files.
ANSWER: Nonce is used in the file' header and nonce combined with the passphrase. That
can create a high random key. This random key should generate each time of encryption of the
file.
EXERCISE 9
Warm Up Activity
Across
*EMAIL
*EMAIL PROTOCOL
*INTERNET
Down
*CLOUD SERVICE
*DELIVERY
E M A I L
E M A I L P R O T O C O L
V D
I N T E R N E T
C L
E I
EXERCISE 14
1.Describe the structure of an email message. Identify typical header fields. How
does the format mark the end of a message’s regular headers?
ANSWER: A message begins with several headers, which are formatted lines beginning with a
header identifier, followed by a colon and a space, followed by the contents of the header. Many
standard header identifiers are specified in RFC 822 and follow-up RFCs. Any other header
used for non-standard purposes may be created of the form X-headername:After the headers
comes a blank line, followed by the message body (which doesn’t concern us).Your E-mail
software, by default, will only display a subset of the headers found in a typical message,
because the rest aren’t normally important to you. In order to figure out where a message came
from, however, you need to look at the Received: headers.
3.Describe a typical strategy for formatting an email message with text features
not found in a plaintext file.
ANSWER: OPTIMIZE YOUR PLAIN-TEXT EMAILS Most email service providers (ESPs) will
send in multi-part MIME automatically, or walk you through setting this up as an option.
However, these auto-generated plain-text versions are usually unorganized and difficult to read.
5.Describe how all three types of network switching (message, circuit, and
packet) are used in the email system.
ANSWER: The store-and-forward switching method
In this method, the switch waits till all bits of the frame are received. After receiving all bits of the
frame, the switch verifies whether the received frame is error-free. If the received frame is error-
free, the switch forwards the frame from the selected port or ports. If the received frame
contains errors, the switch discards the frame.
To know the condition of a frame, the switch uses the FCS (frame check sequence) field of the
frame. The FCS field contains a value known as the CRC value. The CRC value allows a
receiving device to know whether the frame is exactly in the same state as the source packed it
or it has been damaged or tempered in the middle.
After creating a frame, the sender or the source device runs the CRC (Cyclic Redundancy
Check) algorithm on it. The value produced by this algorithm is known as the CRC value. The
CRC value is stored in the FCS field of the frame. After storing the CRC value, the sender
device loads the frame on the media.
Upon receiving the frame, the receiver or destination device runs the CRC algorithm on the
frame and compares the result with the CRC value stored in the FCS field of the frame. If the
result and the CRC value are the same, the frame is considered error-free. If they are not the
same, the frame is considered as the damaged frame.