.
Decryption
Encryption
Network Security
Information Hiding
Worm
Trojan
Bomb
Virus
To find some insecurity in a cryptographic scheme
To increase the speed
To encrypt the data
To make new ciphers
Stream control transmission protocol (SCTP)
Transport layer security (TLS)
Explicit congestion notification (ECN)
Resource reservation protocol
48, 32
64,32
56, 24
32, 32
IP header
IP trailer
Entire IP packet
IP payload
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Internet key Exchange (IKE)
All of the mentioned
Replaced
Over view
Changed
Violated
Hash function used
Private key of the user
Public key of the user
Key used in AES
Confidentiality
Integrity
Authentication
All
Uses third-party CAs to validate a user's identity.
Uses digital signatures to validate a user's identity.
Uses tokens to validate a user's identity.
Are used primarily by individuals for personal correspondence.
Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Two key for symmetric ciphers, two keys for asymmetric ciphers
One key for symmetric ciphers and asymmetric ciphers
One key for symmetric ciphers, two keys for asymmetric ciphers
Two key for symmetric ciphers, one keys for asymmetric ciphers
Csk
Kkr
Srt
Msd
Wait!
Here's an interesting quiz for you.