Académique Documents
Professionnel Documents
Culture Documents
Part 2
1. Simplified Data Encryption Standard (S-DES) - Answer (click here)
2. Block Cipher Principles - Answer (click here)
3. Multiple Encryption & DES - Answer (click here)
4. Modes of Operation - Answer (click here)
5. Stream Ciphers - Answer (click here)
6. RC4 - Answer (click here)
7. Principles of Public Key Cryptography - Answer (click here)
8. RSA Algorithm - Answer (click here)
Part 3
1. Diffie-Hellman Key Exchange - Answer (click here)
2. Elliptic Curve Cryptography - Answer (click here)
3. Hash Functions - Answer (click here)
4. Simple Hash Functions - Answer (click here)
5. Birthday Attacks - Answer (click here)
6. Security of Hash Functions and Macs - Answer (click here)
7. Secure Hash Algorithm - Answer (click here)
8. Digital Signatures - Answer (click here)
9. Direct Digital Signatures - Answer (click here)
10. Digital Signature Algorithm(DSA) - Answer (click here)
Part 4
1. Authentication Applications - Answer (click here)
2. Kerbero V4 Authentication Dialogue Message Exchange - Answer (click
here)
3. X.509 Certificates - Answer (click here)
4. Authentication Procedures - Answer (click here)
5. Electronic Mail Security - Answer (click here)
6. Public-Key Management - Answer (click here)
7. S/MIME - Answer (click here)
8. S/MIME Functionality and Messages - Answer (click here)
Part 5
1. Intruders - Answer (click here)
2. Intrusion Detection - Answer (click here)
3. Password Management - Answer (click here)
4. Firewalls: design principles, characteristics, Limitations, Types - Answer
(click here)
5. Firewall configurations - Answer (click here)
6. Trusted systems - Answer (click here)
7. Viruses And Related Threats - Answer (click here)
8. Types of Network Viruses - Answer (click here)
9. Network Virus Countermeasures - Answer (click here)
Chapter 19 IP Security
1. IP Security(IPsec) - Answer (click here)
2. IP Security Overview - Answer (click here)
3. IP Security Policy - Answer (click here)
4. Encapsulating Security Payload - Answer (click here)
5. Combining Security Associations - Answer (click here)
6. Internet Key Exchange - Answer (click here)
7. Cryptographic Suites - Answer (click here)