A)

Differentiate: Block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples (Max Half a page)

B)

i)Compare monoalphabetic and polyalphabetic ciphers.

ii)using the Caesar Cipher Method, crack this coded message-decrypt the ciphertext—WXWRULDO. Illustrate your work(Max half a page)

References and in-text citations must be APA compliant.

C)

i).In what ways can a hash value be secured so as to provide message authentication?(Half a page)

ii).Elaborate on the applications, weaknesses and limitations of the hashing algorithms.(Half a page)

References and in-text citations must be APA compliant.

D)

i)In steganalysis, which methods are used to detect steganography?(Half a page)

ii)Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryptions.(Half a page)

References and in-text citations must be APA compliant.

Published by
Ace Tutors
View all posts