You are on page 1of 1

Internetworking Security

Internetworking Technologies (IT203)

Tutorial 03

Question 1
Key length plays an important factor in strength of encryption. Argue for and against key length
improving security.

Question 2
a) Compare and contrast symmetric and asymmetric encryption.
b) Describe how Pretty Good Privacy (PGP) encryption works, using a block diagram.
c) Explain the advantages of PGP encryption.

Question 3
a) Explain the authentication used in WEP and WPA.
b) Using a detailed truth table or Boolean algebra, explain the key vulnerabilities in using
WEP encryption.
c) Why is WPA better?
d) How does TKIP work?

P.Bhungee Page 1 of 1

You might also like