logo

ITEC852 Advanced System And Network Security Assignment

   

Added on  2020-05-04

5 Pages666 Words59 Views
ITEC852 Assignment 2017Question 1Since the slammer codes attack exploits port 1434 and makes it to generate IP addresses. It won’t spread to the entire system or IP addresses since the UDP ports in which it replicates are secure.Question 3(a)S e c u r I t y I S p e a c e O f M I n dkey security18 4 2 20 17 8 19 24 18 4 2 20 17 8 19 24 18 4 2 20 2036 8 4 4 40 34 16 48 29 22 17 24 17 10 13 28 23 16 10 33 20)26K I e e o I q w d w r x r k n c x q k 7 uCipher text= kleeoIqwdwrxrkncxqk7u(b). Since the substitution ratio of plain text to cipher text is 1:many.None of the decrypted text will be affected.(c)Dictionary attack is a method for defeating a cipher by finding its paraphrase in many possibilities and trying to find which one can succeed among them. The following can be used to make it infeasible. Using Strong passwords against it. Blocking of IPs that can attack the SSH.(d). The size of the key bytes is 64bytes. The keystream is a repetition of the initial key stream of length m. (1<m<=26).

Question 4a)When decrypting a change in the cipher text will tamper or change the two plain texts thus a single byte error will cause many errors in transmissionb)i. The system has Decrypting which does the following. C1=Dec(k)c6 ii. The text will have no meaning because there is exchange of the decrypting and encrypting keys, iii. Presence of decrypting and encrypting keys. Use of highly technical algorithms. b. The system becomes weak since the encryption and the decryption keys are the same. This means anybody with the key can be able to access the information.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security in Computing and IT in PDF
|13
|2776
|33

Cryptography Tutorial with Examples and Exercises - Desklib
|20
|3498
|416

Cryptography Assignment | Doc
|6
|741
|19

Foundation of Cyber Security
|23
|5334
|304

Security and Risk Management: Double DES Encryption and Cybersecurity Failure Report
|16
|3721
|400

Applied Cryptography Assignment 2022
|17
|2555
|21