COMPUTER SECURITY AND CRYPTOGRAPHY

COMPUTER SECURITY AND CRYPTOGRAPHY

  1. Briefly explain the following
  2. i) Cryptography                                                            
  3. ii) Steganography                                                            
  • iii) Prime Factorization                                    
  1. Briefly explain the mathematical basis that provides the foundation for the usefulness o f public key cryptography?                                                                                    
  2. Discuss the significance of key length in private key cryptography?        
  3. Identify three main features of any two symmetric key block ciphers

Given that Alice and Bob want to communicate over a public link using Diffie Hellman algorithm and the value of p = 43 while g = 13. Alice chooses kA = 5 while Bob chooses kB= 7, determine the shared key(show working)

Get your college paper done by experts

Do my question How much will it cost?

Place an order in 3 easy steps. Takes less than 5 mins.