It security UE Past Papers Questions.
View All Courses |
||||||||
---|---|---|---|---|---|---|---|---|
(308) Question Category: Short answers A message has 20 characters. If it is supposed to be encrypted using a block cipher of 64 bits, find the size of padding and number of blocks Answer / Solution UNSOLVED |
||||||||
(309) Question Category: Short answers Using Simplified DES ( S-DES) algorithm to generate the first round key (K1) and using that key to produce output of the first round ciphertext . Information in the appendix A can be useful in this question.
appendix A P10 -- for key generation
P8 -- for key generation
Initial and final permutation -- for encryption
Answer / Solution UNSOLVED |
||||||||
|
||||||||
(310) Question Category: Short answers
Answer / Solution UNSOLVED |
||||||||
(311) Question Category: Short answers Security is one of the main challenges which system developers face. The current system development methodologies do not provide enough evidence of integrating successifully security concerns throughout the whole range of development phases. The security concerns are based on five security goals of IT security. By using any software development methodology as refernce, show how you will incorporate the security concerns in your analysis, design, development , testing , evaluation and maintenance of a secure web based students information system for your university. Answer / Solution UNSOLVED |
||||||||
|
News & Updates | Recently
Recent Updates |
---|
2024-05-02: questionsQuestions Uploaded on 2024-05-02 |
2024-03-29: questionsQuestions Uploaded on 2024-03-29 |
2024-03-19: questionsQuestions Uploaded on 2024-03-19 |