CS101 Assignment No 5 Spring 2012 solution

Question No.  1:                             

A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:

 

Instructions for Column “a” to “c”:

a)      The latest “technology” or “version” name.

b)     You will define portability in “Yes” or “No”.

c)      Is it “H/w” or S/w based?

 

 

Name Column a

Column b

Column C

Bluetooth

Bluetooth 4.0

Yes

Both H/w, S/w

Window

Windows 8

No

S/w

3G

iPhone 3G 3.0

Yes

Both H/w, S/w

Modem

Gemini 112K

No

Both H/w, S/w

RAM

DDR3

Yes

H/w

Question No. 02                        

 

The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.

 

 

SNO

Key length

Symmetric/asymmetric

Year proposed

RSA

1,024 to 4,096 bit typical

Both

1978

AES

128, 192, 256 bits

Symmetric

November 26, 2001

Serpent encryption algorithm

128, 192, 256 bits

Symmetric

2000

 

DOWNLOAD SOLUTION HERE
loading...