Aias Assessment Finals
Aias Assessment Finals
Warm up Activity
ACROSS DOWN
2. Diagram 1. Procedure
6. Vigenére Cipher 3. Information
7. Plaintext 4. Cryptanalysis
8. Key 5. Encryption
9. Secret
EXERCISE 7
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly
and concisely. Please observe correct grammar.
A.
DES is the data encryption standard, which describes the data encryption
algorithm (DEA). IBM designed DES, based on their older Lucifer symmetric
cipher, which uses a 64-bit block size (ie, it encrypts 64 bits each round) and
a 56-bit key.
G V R S T E K N Y E S N Q K I
N X U Y R I Y F R B E R C L G
I Q L C P Z R L H W Z A C N N
Y I E F N T Y G A V T L T R A
E S V F M K O Y E T Z Y W X T
K U W K R Q H N A T H M Q L U
E B Y I J A E Y E Y N H X X R
R G J Z S T A K W T T I D P E
J A Z H K D I N R X S I C H S
G A B Y H Y E K C I L B U P S
X O A T U U P C K N X U R J B
P C R Y P T O P E R I O D S O
T I C O D D R L P L S W A F R
B I V N T J C V W I Q F A C O
EXERCISE 8
Instruction: Answer the following on a whole sheet/s yellow paper. Write legibly
and concisely and please observe correct grammar.
2. If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or
larger) passphrase?
Reused key stream- is the concept that uses same key in multiple times to
encrypt the data. That is same key is used to encrypt the different
messages. Problem with the reused key stream:
When a key is used in multiple times to encrypt the message, this is should
allow the intruder to penetrate the key or key stream. Then intruder easily
decrypt the messages, which are transmitted later. Therefore, in order to
protect the file the keys shouldn't use more than once.
4. Describe the role of the nonce in preventing reused key streams when using
the same passphrase to encrypt different files.
There are two blocks used in file's header in order to design the internal key
for the file or message,
1. One way hash key - Hashing is the function, which is converted the
arbitrary length message into fixed length message.
2. Nonce- is used in the file' header and nonce combined with the
passphrase. That can create a high random key. This random key should
generate each time of encryption of the file.
Advantage of nonce: Nonce shouldn't repeat itself. If same passphrase used
to bind the message, then nonce will generate a new key.
Key wrapping is the technique that encrypts the key itself using the
passphrase. Key wrapping is used two types of keys to encrypt the file.
1. Content encryption key (CEK)-is used to encrypt the data, which is in the
file.
2. Key encrypting key (KEK) - Is used to produce the passphrase.
When CEK is encrypted with the KEK, then wrapped key is produced.
Encrypt the file using wrapped keys:
• Initially collect the passphrase from the user.
• Hash the passphrase to produce KEK
• Generate CEK using random keys
• Encrypt the CEK and KEK, in order to produce the wrapping key.
• Encrypt the file using CEK
• Again file is encrypted file by combining ciphertext and wrapped key
EXERCISE 9
Instruction: Answer the following on a whole sheet/s yellow paper. Write
legibly and concisely and please observe correct grammar.
1. Explain the difference between file encryption and volume encryption.
File encryption means converting a data into a secret code. In order to read
this converted file, this needs a key or password to decrypt it. Volume
encryption means encrypting all files in the volume.
Divide the key schedule into subsections, one per round. - For each
subsection, perform a round: For the first round, take the plaintext as the
input text; for the remaining rounds, take the output of the previous round
as the input text.
A circuit or chip that translates commands into a form that can control a
hard disk drive.
WARM UP ACTIVITY
EXERCISE 14
1. Describe the structure of an email message. Identify typical header fields. How
does the format mark the end of a message’s regular headers?
3. Describe a typical strategy for formatting an email message with text features
not found in a plaintext file.
5. Describe how all three types of network switching (message, circuit, and
packet) are used in the email system.