Skip to content

CS315 - Network Security

5 Topics 21 Posts
  • 0 Votes
    1 Posts
    238 Views
    No one has replied
  • CS315 Lecture Handout and Videos Download

    1
    0 Votes
    1 Posts
    309 Views
    No one has replied
  • 0 Votes
    6 Posts
    204 Views
    zareenZ

    @zareen said in CS315 Assignment 3 Solution and Discussion:

    User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk.

    Unlike the biological viruses that cause the common cold, people create … Despite the many variations of viruses, most have two phases to their execution: infection and delivery. … the Calculator, Notepad, Help, and other programs on the hard disk. The virus then scans the computer to locate .exe files on other drives and …
    Reff

  • 0 Votes
    6 Posts
    282 Views
    zareenZ

    @zareen said in CS315 Assignment 2 Solution and Discussion:

    b) Number of keys being used for cryptography.

    Although symmetric key cryptography makes use of only one key, asymmetric key cryptography, also known as public key cryptography, utilizes two keys: a public key and a private key. The public key is used to encrypt data sent from the sender to the receiver and is shared with everyone.

    Public and Private Key Concept in Encryption

    Secret key cryptography (symmetrical encryption): Both the sender and receiver must use the same key to encrypt and decrypt messages being sent. This imposes a security risk as we need to deliver the key to the recipient of the message in a secure way to make him/her able to decrypt the message. If an intruder gets hold of the key somehow, he/she will be able to decrypt the secret message and thus compromise the whole operation.

    Public key cryptography (asymmetrical encryption): In this method we use two keys, one for encryption and the second for decryption. A user will use his/her friend’s public key to encrypt the message. The receiver will use a private key (which should be kept secret) in order to decrypt this message when needed. The public key is used to encrypt plain text or to verify a digital signature, whereas the private key is used to decrypt cipher text or to create a digital signature. Messages encrypted with the public key can only be decrypted using the associated private key pair.

    Source

  • 0 Votes
    7 Posts
    294 Views
    zareenZ