Cns 2marks
Cns 2marks
1.Write the difference between public key and private key crypto systems?
To conclude, private keys can be used for both encryption and decryption, while Public keys are used
only for the purpose of encrypting the sensitive data. Private keys are shared between the sender
and the receiver, whereas public keys can be freely circulated among multiple users.
• Password Requirements.
• Out-of-Band Verifiers.
A birthday attack is a cryptographic attack that uses probability theory to find hash collisions. It's a
type of brute-force attack that exploits the birthday paradox.
A MAC address (short for medium access control address) is a unique identifier assigned to a
network interface controller (NIC) for use as a network address in communications within a network
segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi,
and Bluetooth.
A hash function is a mathematical function or algorithm that simply takes a variable number of
characters (called a ”message”) and converts it into a string with a fixed number of characters.
Weak collision resistance is a property of a hash function that makes it difficult to find another input
that produces the same hash as a given input. It's also known as second preimage resistance.
To produce an authenticator, the primary function used is a Message Authentication Code (MAC).
• Mac function
• Cryptography hash func
• Secret key
8. Define S/MIME?
Secure/Multipurpose Internet Mail Extensions (S/MIME) is an email encryption and signing protocol
that protects the content and integrity of messages.
CNS 2MARKS
9.What are zombies?
Zombies are mythological creatures that are usually depicted as reanimated corpses of humans:
• Appearance
• Origin
• Purpose
someone who enters a place without permission in order to commit a crime: Intruders had entered
the house through a back window.
• Encryption
• Ip address management
• Replay protection
• Safeguarding ip address
• Centralized management
• Data origin authentication
Tunnel Mode provides end-to-end security by encrypting the entire IP packet, while Transport Mode
only encrypts the payload of the packet.