CS101 Assignment # 5 Idea Solution July 2012
Question No. 1: [10 marks]
A Comparison table is given below showing different technologies. You
have to fill the columns a, b and c respectively by using given instructions:
Instructions for Column “a” to “c”:
a)
The latest
“technology” or “version” name.
b)
You will
define portability in “Yes” or “No”.
c)
Is it “H/w”
or S/w based?
Solution:-
Name
|
Column a
|
Column b
|
Column C
|
Bluetooth
|
Bluetooth v 4.0(30-06-2010)
|
Yes
|
H/W
|
Window
|
Wndows8 (31-05-2012)
|
Yes
|
S/W
|
3G
|
WIMAX (IEEE 802.16)
|
Yes
|
S/W
|
Modem
|
Broadband Modems
|
Yes
|
H/W
|
RAM
|
DDR3 (2007)
DDR4 (2012-2013) |
Yes
|
H/W
|
Question No.
02 [10 marks]
The data of few organizations are very
sensitive and can create problems if it is compromised. Organizations take
different measures to protect their sensitive data. Cryptography is a process
of securing our sensitive data on computer networks. Different algorithms are
used to protect our data from misuse by other users. Some of the popular
algorithms are given below. You are required to read these algorithms and fill
the following table after your research.
Solution:-
SNO
|
Key length
|
Symmetric/asymmetric
|
Year proposed
|
RSA
|
1024
to 4096 bits
|
asymmetric
|
RSA
algorithm was proposed in
1978,1977 by Rivest, Shamir, and Adleman
|
AES
|
128, 192, 256 bits
|
Symmetric
|
1st
published in 1998. Designers (Vincent Rijmen, Joan Daemen)
|
Serpent encryption algorithm
|
128, 192, 256 bits
|
Symmetric
|
Serpent
was designed by Ross Anderson, Eli Biham, and Lars Knudsen.
|
0 comments:
Post a Comment