Académique Documents
Professionnel Documents
Culture Documents
PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall
2011
SEMESTER
4
SUBJECT
MIT4022- Cryptography and Network SecurityCODE & NAME
Qus:2 Define cryptography. Describe the different dimensions used to characterize the
cryptographic systems.
Answer: Cryptography secret writing is the strongest tool for controlling against many
kinds of security threats. Well-disguised data cannot be read, modified, or fabricated easily.
Cryptography is rooted in higher mathematics: group and field theory, computational
complexity,
Qus:4 Describe the following schemes for the distribution of public key:
a) Public announcement
b) Publicly available directory
Answer: a) Public announcement The cryptanalyst may be lucky enough to have some
pairs of plaintext and matching ciphertext. Then, the game is to deduce the key by which
those pairs were encrypted so that the same key can be used in cases in which the analyst has
only the ciphertext. Although it might seem uncommon to be able to obtain matching plain-
and