3. Cryptography is the science of writing in secret, information
in this technology is available
to the user but making sense of it is impossible but it is
scrambled.
(i) Using relevant examples, write in great details the real-life
application of a stream cipher.
(ii) With examples, comment on the weaknesses of a Caesar cipher,
and what was done in the
past to strengthen it.
(iii) With reference to secure hash algorithm (SHA-1), describe
what a hash is and how it is
derived and what is role does the algorithm length play in its
strength?
(iv) Using the stream cipher, show all your working on how the
following message (m) and
the key (k) can be ciphered in a step by step. Given the message
“systems security is simple”
and the key “auto”.
(v) Alice wants to communicate with Boyd using the Diffie-Hellman
public key
infrastructure. The two communicating parties agrees to use the
modulus function of 7mod13.
Alice picks the secret key 3 and raises it to the exponent of the
agreed function while Boyd
picks 5. Calculate the exchange keys of both parties and the final
private key they will use to
securely communicate over the internet.
(vi) In great details, describe how cryptography is used in the
modern-day technology to
communicate securely on the internet. In your explanation make
reference to how browsers
utilize TLS/SSL protocols to secure a client on end to end with the
server.
3. Cryptography is the science of writing in secret, information in this technology is available to the user but making
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am