Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT-478-Network Security

Description

Question One

Transfer the plaintext “I love Network Security” to ciphertext by using the following operations:

– Substitution (Atbash Cipher)

– Columnar Transposition (Key Word: Saeed)

In your words, what are the strengths and weaknesses of these operations?

Question Two

Why is unpredictability in random numbers more critical than simple randomness for cryptography? Illustrate your answer with one example.

Question Three

What is the difference between symmetric and asymmetric encryption? Are hashing and encryption the same? Please clarify.Question Four

Answer the following questions based on the Kerberos protocol:

a) In Step 1, Alice’s request to the Authentication Server (AS) is sent in plaintext. Why is it considered secure to send her identity without encryption at this step?

b) In Step 2: What is the major security advantage of discarding the key immediately after initial authentication?

c) Explain how the combination of the ticket and the timestamp in Step 3 of the protocol makes it difficult for an attacker to perform a replay attack. Why can’t an attacker simply reuse a captured message from Step 3?

d) In Step 4. Why does TGS send a ticket specifically for Bob, encrypted with Bob’s key, instead of just sending the session key to Alice?

College of Computing and Informatics

Assignment 1
Deadline: Wednesday 01/10/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###

ID: ###

CRN: ###
Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Question One

Pg. 01
Learning
Outcome(s):
CLO1:
Explain the
concepts of
cryptography,

Question One

Transfer the plaintext “I love Network Security” to ciphertext by using the following
operations:
– Substitution (Atbash Cipher)
– Columnar Transposition (Key Word: Saeed)
In your words, what are the strengths and weaknesses of these operations?

encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.

Restricted – ‫مقيد‬

2 Marks

Answer:

Question Two

Pg. 02
Learning
Outcome(s):
CLO1:

Question Two

Why is unpredictability in random numbers more critical than simple randomness for
cryptography? Illustrate your answer with one example.

Explain the
concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.

Restricted – ‫مقيد‬

2 Marks

Answer:

Question Three

Pg. 03
Learning
Outcome(s):

Question Three

2 Marks

CLO1:

What is the difference between symmetric and asymmetric encryption? Are hashing and
encryption the same? Please clarify.

Explain the

Answer:

concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.

Restricted – ‫مقيد‬

Question Four

Pg. 04
Learning
Outcome(s):

Question Four

2 Marks

Answer the following questions based on the Kerberos protocol:

CLO1:
Explain the
concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.
a) In Step 1, Alice’s request to the Authentication Server (AS) is sent in plaintext.
Why is it considered secure to send her identity without encryption at this step?
b) In Step 2: What is the major security advantage of discarding the key immediately
after initial authentication?
c) Explain how the combination of the ticket and the timestamp in Step 3 of the
protocol makes it difficult for an attacker to perform a replay attack. Why can’t
an attacker simply reuse a captured message from Step 3?
d) In Step 4. Why does TGS send a ticket specifically for Bob, encrypted with Bob’s
key, instead of just sending the session key to Alice?
Answer:

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Management Question

Description Assgiment MGT321 ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Introduction to International Business (MGT 321) Due Date: 28/02/2026 @ 23:59 Course Name: Introduction to International Business Course Code: MGT-321 Student’s

mgt404 , Organization Design and develop

Description General Instructions – PLEASE READ THEM CAREFULLY • • • • • • • • The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Assignments submitted through email will not be accepted. Students are advised to make their work clear and well presented; marks may

112 ACT 1

Description Describe the difference between EHR and EMR? provide an example? 2 REFERANCES

505 DIS 2-1

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-2

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-3

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-4

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-5

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-6

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-7

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-8

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-9

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-10

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-11

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-12

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-13

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-14

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing

505 DIS 2-15

Description Locate a research study that utilized experimental or quasi-experimental methods. Briefly summarize the study. For example, discuss the inclusion of 2-group tests, regression analysis, and time-series analysis in terms of the study design’s strengths, weaknesses, or limitations. What challenges or limitations did the researcher identify they encountered by choosing