0% found this document useful (0 votes)
2 views6 pages

CSS Assignment 1

The document outlines key security goals: confidentiality, integrity, and availability of information in computer systems. It explains the Hill Cipher encryption method and the Euclidean algorithm for finding the greatest common divisor. Additionally, it discusses the Advanced Encryption Standard (AES) as a widely used encryption algorithm that secures data against unauthorized access.

Uploaded by

aniketmutal40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views6 pages

CSS Assignment 1

The document outlines key security goals: confidentiality, integrity, and availability of information in computer systems. It explains the Hill Cipher encryption method and the Euclidean algorithm for finding the greatest common divisor. Additionally, it discusses the Advanced Encryption Standard (AES) as a widely used encryption algorithm that secures data against unauthorized access.

Uploaded by

aniketmutal40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Pillai HOCCollege of

and Technology Engineering Date:

Explain secuTity goals.


Ihe
4oals
Confidenhalits mahon
ensyYes
0n
th at he nfor
the
4xansmited infomation Lompute1 System_and
for aTe
Teading by authoized pahes accessihle anls
The pinciple of
only the. Sendex confidenHaits
and
sp that
th 0cCess
TecelVeY should be able
the
Contents messa qe
eq Prinhng displauing and other for ms.
disclo SUTE
2
inteqzihy PnsuYes that the
authorize d paries
able to
assets and tyansmited
madify- computex System
informaion
Mpdificaion in cludes writing changin4- sta tus
deleting- cTeaing and delaying
Af transmited Messages
re
eplaying

ANAilability Ihe priniFle


state that
of availabilits
Ke so UTCes Cin fozmation
shold be availakle Ou thoized
al)l the time.

Page No.
Pillai HOC College of Engineering
and Technology Date:

2. Ust Hill Cipher to the PI meS Sage


SHORI
The Key to USed HILL'

HILL

S HORLX

K: PI mod 26

PI SH

18 mod 26
|26 + 56 mod 26
148 + 7]
I821 mod 26
215
mod 26 AP

2.
14

|41
26

mod 26
AD
Pillai HOCCollege of Engineering
and Technology Date:

TX 191
23

8 19 mod 26
23
311 mod 26
462
mod 26
FU

APADFU

03 Explain Euclidian Algorithm


The Fuclide an algorIHhm tinds Hhe qTeates t
cduca
Sto
i

divisox of tuuo numhfrA a and eoEfn g

Cmen
The is the laTgest numbeT that diwides
bo th and withoUt Temainder
leaving
Algnithm
a b
GCD (ab)
a b ) : GcD (b, a mod b)
GCD La,0)

OR

Page No.
Pillai HOCCollege of Engineering
and Technology Date:

then
neturn a
else
euzn

GCD( 5012) = GCD(12 50 mod 12)


GCD (12,2)

GacO(12,2) G1CD 2 2 mod 2)


GCD 2,0)

GCD 2
Pillai HOCCollege of Engineering Date:
and Technology

Q4
kesuord DOMESTIC
Ihe key is hidden wnder Hhe dor
sting
O
Ix E

A B
G K
N P R
W X

string Ihe key is hidden unde he

CI CE AR AE 30 GCIL HRNP 0S NA k MOMEP


Explain advanced encupted 5tandard AES)
in de tail

Advanced Encuntion standad


Standard LAES) is a highls
thusted encryption alaDTithm USed to secTe
data by conuerHng it into unTeadab le
format with out the
propeT key
AES USeS Varios
256 bits) to pYoVide
key lengthsI28, 192
Qgainst
unauhorized strong pYotecHon
acceSS
Ihe data Secumu rmeasUTe 0s efficicnt
widels implermented SecuTing. internet
and
COnnecipn and cormmvnication pTDtecing
sensiHve data
encrupbing tiles
AES conesone moden
TeLOanized qlobally fon cyphqaphy
ability o
keep informahon SOfe from cube threats

AF S block cipher which per forms


Dpeoions hytes data ther than
in bits

It widely USed wjYeleSS


secuxihy
encypion
database
and daa shovage
secYe
LormmUnicaions
Page No.

You might also like