its cryptography and networking book by atul kahatey which is used for the engineering syllabusFull description
Full description
Lab ManualFull description
this will helpful for the network oriented guysFull description
CRYPTTSFull description
Networking is a process that the exchange of information and ideas among individuals or groups. We can communicate with each other in network via messaging application for example email service
Documentation on Network SecurityFull description
ActivityFull description
Full description
Network security planning and design
it concerns some basis on cryptography
Security is the most common aspect of today's world, when all things are going to digitize then make them secure over the communication channel has become the prime aim of the digital service providers. Although many encryption and decryption techniq
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The propos
Case Studies on Cryptography and SecurityFull description
The Ultimate Network Security Checklist.
Deskripsi lengkap
Set 1 Q. The sender "signs" a message as: (a) Digital Signature (b) Artificial Signature (c) Encrypted Signature (d) All of the above
Q. In encryption: (a) Public key is used (b) Private key is used (c) Both public and private keys are used (d) None of the above
Q. Authentication is done by: (a) Conventional encryption (b) Scrambling data (c) Both a and b (d) None of the above
Q. AES stands for: (a) Advanced Encryption Standard (b) Advanced Encryption System (c) Advanced Encryption Suggestion (d) None of the above Q. DES stands for: (a) Data Encryption Standard (b) Data Encryption System
(c) Data Encryption Suggestions (d) None of the above
Q. Secret key is: (a) Used with algorithms (b) Not used with algorithm (c) Never used any where (d) None of the above Q. Decryption algorithm: (a) Encrypts input data (b) Decrypts the encrypted data (c) Both a and b (d) None of the above
Q. Encryption algorithm: (a) Encrypts input data (b) Encrypts output data (c) Both a and b (d) None of the above
Q. Encryption protects against: (a) Attacks (b) Loss of data (c) Both a and b (d) None of the above Q. Authentication is: (a) Verification of user's identification (b) Verification of the data (c) Both a and b (d) None of the above
Q. Two way authentication is: (a) Double transfer of information (b) No transfer of information (c) Half duplex transfer of information (d) None of the above
Q. One way authentication is: (a) Single transfer of information (b) Duplex transfer of information (c) Half duplex transfer of information (d) None of the above Q. SHF stands for: (a) Symmetric Hash Function (b) Securre Hash Function (c) Simulated Hash Function (d) None of these
Q. Block cipher process: (a) 1000 bits at a time (b) Secure Hash Function (c) Both a and b (d) None of the above
Q. The process to discover plain text or key is known as: (a) Cryptanalysis (b) Crypto design (c) Crypto processing (d) Crypto graphic Q. Output message in cryptography is called: (a) Plain text (b) Cipher text (c) Both a and b (d) None of the above
Q. Input message in cryptography is called: (a) Plain text (b) Cipher text (c) Both a and b (d) None of the above
Q. In cryptography: (a) Information is transmitted from sender to receiver (b) No information is transmitted
(c) Information is damaged (d) None of the above Q. Cryptography means (a) Secret writing (b) Word processing (c) Parallel processing (d) All of the above
Set 2 Q. The most widely used public key algorithms are (a) RSA (b) Diffie Hellman (c) Both a and b (d) None of the above
Q. Secure hash algorithm developed by: (a) National Institute of Standards and Technology (NIST) (b) IEEE (c) ANSI (d) None of the above
Q. Data Encryption Algorithm: (a) Generates encrypted version of the message (b) Generates non-encrypted version of the message (c) Generates secret keys (d) None of these
Q. Message authentication code: (a) Generates small block of data (b) Generates large block of data (c) Does not generate data (d) None of the above Q. Session by: (a) Establishes Logical Connection (b) Establishes physical connection (c) Both a and b (d) None of the above
Q. Triple DEA (TDEA) was first proposed by: (a) tuchman (b) Rivest (c) both a and b (d) None of the above Q. The most commonly used conventional encryption algorithms are: (a) Block ciphers (b) Transposition ciphers (c) Both a and b (d) None of the above Q. Data Encryption standard is: (a) Most widely used scheme (b) Rarely used (c) Not used (d) None of the above
Q. In cryptography: (a) Plain text is converted into cipher text (b) Plain text remains as it is (c) Plain text is updated (d) None of the above
Q. Conventional encryption is: (a) Symmetric encryption (b) Secret key encryption (c) Single key encryption (d) All of the above Q. Security mechanism is ensured is: (a) Detect attack (b) Prevent Attack (c) Recover From attack (d) All of the above
Q. IDEA stands for: (a) International Data Encryption Algorithm (b) International Digital Encryption Algorithm (c) International Data Entity Authentication (d) None of the above
Q. In private key cryptography: (a) Sender and receiver both must have secret key (b) Sender and receiver both need not have a secret key (c) Only sender must have the secret key (d) Only receiver must have the secret key
Q. In cryptography? (a) Secret key is used (b) Secret key is not used (c) Secret key damaged (d) None of the above
Q. In network secruity: (a) Data is Protected From Hackers (b) Data is Protected From Cracker (c) Both a and b (d) None of the above
Q. DSS stands for: (a) Digital signature standard (b) Digital sound system (c) Digital simulation schemes (d) None of these Q. Hash Function is used to produce: (a) Finger print of a file (b) Useful for message authentication (c) Both a and b (d) None of the above
Q. TDEA stands for: (a)
Triple Data Encryption Standard
(b)
Third Data Entity System
(c)
Third Data Entity System
(d)
All of the above
Q. Cryptography ensures: (a) Confidentiality of data (b) Authentication of data (c) Integrity of data (d) All of the above Q. In network security: (a) Data is protected during transmission (b) Data is not protected transmission (c) Data is changed (d) None of the above
Set 3 ....................... (a) Secure Hash function (b) Symmetric Hash Function (c) Crypto processing (d) Secure Hash file
Q. The process to discover plaintext or key is known as: (a) Cryptanalysis (b) Symmetric Hash Function (c) Crypto processing (d) Observation Cryptographic
Q. Secure hash algorithm was developed by: (a) IEE (b) NIST
(c) Never (d) None of the above
Q. In cryptography receiver encrypts the message and sender decrypts the message: (a) True (b) False (c) Never (d) Can't say Q. Network security ensures................. (a) Detecting attacks (b) Preventing attacks (c) Recovering attacks (d) All of the above
Q. DSS stands for: (a) Digital signature standard (b) Digital Signature simulation (c) Digital signature strategies (d) Digital Signature system
Q. TDES means: (a) Triple digital Encryption standard (b) Triple Data Encryption System (c) Triple Data Encryption Standard (d) Triple Digital Encryption System Q. Hacking refers to: (a) Data access without permission
(b) Data updation without permission (c) Data deletion without permission (d) All of the above
Q. The sender 'sings' a message as............... (a) By hand (b) By speaking (c) Digital signature (d) Any of the above Q. AES stands for: (a) Advanced Encryption System (b) Advanced Encryption Solution (c) Advanced Encryption strategies (d) Advanced Encryption Standard
Q. Public key is known to everybody: (a) Attacks (b) Viruses (c) Manipulation of data (d) All of the above
Q. Encryption protects against: (a) Attacks (b) Viruses (c) Manipulation of data (d) All of the above Q. Authentication refers to: (a) Verification of user's identity (b) Checking user's privileges (c) Auditing user's process (d) None of the above
Q. The message is decrypted at....................end: (a) Receiver (b) Sender (c) Broker (d) All of the above
Q. Encrypted message is called.............in cryptography: (a) Plain text (b) Cipher text (c) Secret text (d) All of the above Q. In cryptography................... (a) Data is encrypted while sending (b) Data is encrypted while receiving (c) Data is updated while communication (d) None of the above
Q. DES stands for: (a) Data encryption standard (b) Data Encryption security (c) Data Embedded standard (d) Data Easily substitutable
Q. Protocol refer to: (a) Rules (b) Methods (c) Both rules and methods (d) None of the above Q. Cryptography relates to........................ (a) Editing (b) Security (c) Testing (d) All of the above
Set 4 Q.Which of the following is not the basic principle of cryptography? (a) Confidentiality (b) Integrity (c) Atomicity (d) Non-repudiation
Q. Which of the following is not used for symmetric encryption ? (a) RSA (b) DES (c) SHAI (d) RC4
Q. Which of the following algorithm is not based on block encryption? (a) DES (b) TDES (c) RSA (d) AES
Q. Finding plaintext, without knowing key is known is: (a) Cryptography (b) Cryptanalysis (c) Cryptology (d) None of the above
Q. In stream ciphers..............
(a) One character is read at a time (b) Two character are read at a time (c) Eight character are read at a time (d) 32 characters are read at a time
Q. Which is not lreated to cryptography? (a) .............machines (b) Enigma (c) Steganography (d) Analytical Engine
Q. Which of the following is a transposition cipher................ (a) Caesar cipher (b) Vignere Cipher (c) One time pad (d) Playfair cipher Q. Which of the following is a monoalphabetc cipher? (a) Caesar Cipher (b) Lucifer cipher (c) Contradictory cipher (d) Play fair cipher
Q. DES involves the following block cipher technique............ (a) ECB (b) RSA (c) CBC (d) SHAI
Q. ECB stands for: (a) Emergency Code book (b) Electronic Code Book (c) Elective Code Book (d) Encrypted Code Book Q. Hash collision means................ (a) Two keys for one message (b) One key for two message (c) Two different keys for different message (d) Always the same key
Q. RSA involves very large.........numbers: (a) Prime (b) Even (c) Odd (d) Any number
Q. In PKI.................. (a) Public key is known, private key is secrete (b) Private key is knwon, public key is secret (c) Both keys are known (d) Both keys are secret
Q. SHA-1 is similar to...................... (a) RSA (b) DES (c) MD5 (d) Rijndae! Q. MAC means.................. (a) Message Authorization Code (b) Message Authentication Code (c) Message Approximation Code (d) All of the above
Q. Diffie - Hellman key exchange is vulnerable to:.................... (a) Discrete logarithm (b) Elliptic curve cryptography (c) Man in the middle attack (d) None of these
Q. KDC stands for: (a) Karnaugh Display Cycle (b) Key Distribution Center (c) Key Display Cycle
(d) None of these Q. What is the length of key (without padding) in DES? (a) 64 bits (b) 128 bits (c) 72 bits (d) 56 bits