ACC Breakdown
ACC Breakdown
Task 1
Ciphers like DES and AES use bitwise XOR operations in their algorithm.
Implement an algorithm to show how a 4-bit input can be encrypted with a 4-
bit key using XOR function. Provide screenshots of the code.
Introduction
Task 1
2.2 Explain the limitation of symmetric key encryption with relevant given
scenario. (you have to discuss the security vulnerabilities of encrypting with
a single key)
2.3 Explain how asymmetric key encryption can solve the above-mentioned
vulnerabilities. And discuss how hybrid cryptosystems can be used at Ship
cargo. ( when writing your answer please include what is Key Encapsulation
Mechanisms (KEMs), Data Encryption Mechanisms (DEMs), and Public Key
Encryption (PKE). )
Task 3
3.1 Briefly explain what is meant by PKI, and compare the difference and
limitations between private cloud PKI and on-premise PKI.
3.2 Identify security risks and challenges likely to occur when using a cloud-
hosted PKI.
3.3 Take a business scenario from Ship cargo environment and illustrate
how PKI can be used there (with diagrams).
Task 4