Page 246 - DCAP403_Operating System
P. 246

Unit 12: Security Solution




          Fill in the blanks:                                                                   Notes

          3.   A digital certificate is data that functions much like a ....................... .

          4.   A certifying authority creates the digital certificate and digitally signs it using its own

               ....................... .
          5.   ....................... is defined as a method to verify (ex. Public Key’s) electronically for

               authenticity.
          6.   A key in cryptography is a long sequence of bits used by ....................... algorithms.
          7.   One key encodes the message and the other ....................... it.

          8.   Encryption information helps prevent it by ....................... .
          9.   The number of keys each algorithm can support depends on the number of bits in the
               ....................... .
          10.   ....................... schemes are generally categorized as being either stream ciphers or block
               ciphers.

          12.16 Review Questions

          1.   Explain the concept of digital encryption standards
          2.   Write short note on RSA system


          3.   Briefly explain digital signature in details
          4.   What do you mean by digital certifi cate?
          5.   What do you understand by secret key cryptography? Explain with the help of suitable
               diagram.

          6.   Distinguish between DES and Triple-DES techniques.
          7.   “Symmetric cryptography can also be used to address the integrity and authentication
               requirements.” Explain

          8.   Explain the process of verification of digital signature.

          9.   “Stream ciphers operate on a single bit at a time and implement some form of feedback
               mechanism so that the key is constantly changing.” Discuss
          10.   Write short note on “Cipher Block Chaining”.

          Answers: Self Assessment


          1.   (b)                  2.  (a)              3.  physical certifi cate
          4.   private key          5.  Digital certifi cate   6.  encryption/decryption
          7.   decodes              8.  unauthorized user  9.  key
          10.   Secret key cryptography














                                           LOVELY PROFESSIONAL UNIVERSITY                                   239
   241   242   243   244   245   246   247   248   249   250   251