You are on page 1of 2

1.

most secure to least secure

BLOWFISH -- AES -- 3DES--DES

2.Each entity has a pair of mathematically related keys which are Private key
and public key

3. Because no direct trust exists between a data originator and a data


recipient, PKI relies on a third party point of trust system where the CA plays
the role of trust arbitrator. The CA first establishes the identity of a Public-
Private Key owner beyond doubt, then vouches for the owners identity by
embedding the owners Public Key inside of a certificate bearing the CAs
signature

4.For guard agianst replay attacks we can set an expiration timeout (i.e. if the
message does not arrive until the timeout, we don't accept it)

5.

6.We hash passwords to prevent an attacker with read-only access from


escalating to higher power levels.

7.symmetric key encryption use the same key for both encryption and
decryption

asymmetric key encryption use dierent keys forencryption and decryption

8. MD5 hash is e80b5017098950fc58aad83c8c14978e

9.Sha 1 hash 1f8ac10f23c5b5bc1167bda84b833e5c057a77d2

10.40 bit hash

11.Network access authentication and IPSec authentication

12.

13.In WPA, the encryption key is changed after every frame using Temporary
Key Integrity ProtocoI

initialization vector increased from 24 bits to 48 bits. Results in probability of


assigning 500 trillion dierent key

14.Bob and Aloce are communicating in a PKI system.bob wants to send a


secret message to alice.to do this,BOb needs to encrypt the message with
alice public key.once alice receive this message from bob,she decrypt it with
alice private key.

You might also like