Navigation

    Cyberian
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Pro Blog
    • Users
    • Groups
    • Unsolved
    • Solved
    1. Home
    2. Tags
    3. cs315
    Log in to post
    • All categories
    • M

      CS315 Assignment 1 Solution and Discussion
      CS315 - Network Security • cs315 assignment 1 solution discussion spring 2020 • • moaaz

      1
      0
      Votes
      1
      Posts
      79
      Views

      No one has replied

    • zareen

      CS315 Assignment 2 Solution and Discussion
      CS315 - Network Security • cs315 assignment 2 solution discussion fall 2019 • • zareen

      6
      0
      Votes
      6
      Posts
      79
      Views

      zareen

      @zareen said in CS315 Assignment 2 Solution and Discussion:

      b) Number of keys being used for cryptography.

      Although symmetric key cryptography makes use of only one key, asymmetric key cryptography, also known as public key cryptography, utilizes two keys: a public key and a private key. The public key is used to encrypt data sent from the sender to the receiver and is shared with everyone.

      Public and Private Key Concept in Encryption

      Secret key cryptography (symmetrical encryption): Both the sender and receiver must use the same key to encrypt and decrypt messages being sent. This imposes a security risk as we need to deliver the key to the recipient of the message in a secure way to make him/her able to decrypt the message. If an intruder gets hold of the key somehow, he/she will be able to decrypt the secret message and thus compromise the whole operation.

      Public key cryptography (asymmetrical encryption): In this method we use two keys, one for encryption and the second for decryption. A user will use his/her friend’s public key to encrypt the message. The receiver will use a private key (which should be kept secret) in order to decrypt this message when needed. The public key is used to encrypt plain text or to verify a digital signature, whereas the private key is used to decrypt cipher text or to create a digital signature. Messages encrypted with the public key can only be decrypted using the associated private key pair.

      Source

    • zareen

      CS315 Assignment 3 Solution and Discussion
      CS315 - Network Security • cs315 assignment 3 solution discussion fall 2019 • • zareen

      6
      0
      Votes
      6
      Posts
      77
      Views

      zareen

      @zareen said in CS315 Assignment 3 Solution and Discussion:

      User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk.

      Unlike the biological viruses that cause the common cold, people create … Despite the many variations of viruses, most have two phases to their execution: infection and delivery. … the Calculator, Notepad, Help, and other programs on the hard disk. The virus then scans the computer to locate .exe files on other drives and …
      Reff

    • zareen

      SOLVED CS315 Assignment 1 Solution and Discussion
      CS315 - Network Security • cs315 assignment 1 solution discussion fall 2019 • • zareen

      7
      0
      Votes
      7
      Posts
      134
      Views

      zareen