A)
Differentiate: Block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples (Max Half a page)
B)
i)Compare monoalphabetic and polyalphabetic ciphers.
ii)using the Caesar Cipher Method, crack this coded message-decrypt the ciphertext—WXWRULDO. Illustrate your work(Max half a page)
References and in-text citations must be APA compliant.
C)
i).In what ways can a hash value be secured so as to provide message authentication?(Half a page)
ii).Elaborate on the applications, weaknesses and limitations of the hashing algorithms.(Half a page)
References and in-text citations must be APA compliant.
D)
i)In steganalysis, which methods are used to detect steganography?(Half a page)
ii)Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryptions.(Half a page)
References and in-text citations must be APA compliant.