11. How is a secret key different from public key?
In secret key,
the same key is used by both parties. The sender uses this key and an
encryption algorithm to encrypt data; the receiver uses the same key and the
corresponding decryption algorithm to decrypt the data. In public key, there
are two keys: a private key and a public key. The private key is kept by the
receiver. The public key is announced to the public.
12. What is a digital signature?
Digital
signature is a method to authenticate the sender of a message. It is similar to
that of signing transactions documents when you do business with a bank. In
network transactions, you can create an equivalent of an electronic or digital
signature by the way you send data.
13. What are the advantages & disadvantages of public key
encryption?
Advantages:
a)
Remove the restriction of a shared secret key between two entities. Here each
entity can create a pair of keys, keep the private one, and publicly distribute
the other one.
b) The no. of keys needed is reduced
tremendously. For one million users to communicate, only two million keys are
needed.
Disadvantage:
If
you use large numbers the method to be effective. Calculating the cipher text
using the long keys takes a lot of time. So it is not recommended for large
amounts of text.
14. What are the advantages & disadvantages of secret key
encryption?
Advantage:
Secret
Key algorithms are efficient: it takes less time to encrypt a message. The
reason is that the key is usually smaller. So it is used to encrypt or decrypt
long messages.
Disadvantages:
a)
Each pair of users must have a secret key. If N people in world want to use
this method, there needs to be N (N-1)/2 secret keys. For one million people to
communicate, a half-billion secret keys are needed.
b)
The distribution of the keys between two parties can be difficult.
15. Define permutation.
Permutation
is transposition in bit level.
Straight permutation: The no. of
bits in the input and output are preserved.
Compressed permutation: The no.
of bits is reduced (some of the bits are dropped).
Expanded permutation: The no. of
bits is increased (some bits are repeated).
16. Define substitution & transposition
encryption?
.
Substitution: A character level encryption in which each
character is replaced by another character in the set.
Transposition: A Character level
encryption in which the characters retain their plaintext but the position of
the character changes.
17. Define CGI?
. CGI is a standard for communication between HTTP servers
and executable programs. It is used in crating dynamic documents.
18. What are the requests messages support SNMP and explain it?
·
GET
·
SET
The former is
used to retrieve a piece of state from some node and the latter is used to
store a new piece of state in some node.
19. Define SSH?
Secure
Shell is used to provide a remote login, and used to remotely execute commands
and transfer files and also provide strong client/server authentication /
message integrity.
No comments:
Post a Comment