COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
As we saw in class, WEP is vulnerable attacks that allow an active attacker to flip bits in the and unauthorized modifications to the message received by the recipient. What be the best defense against this kind of attack?
A
Use a different key for each direction and for each wireless device.
B
Protect the ciphertext using a MAC.
C
Encrypt using AES in Cipher Block Chaining (CBC) mode
D
Encrypt using AES in Electronic Code Book (ECB) mode.
E
Prepend a random 32-bit nonce to the packet before applying the CRC and encrypting it
Explanation: 

Detailed explanation-1: -Cryptography ensures the integrity of data using hashing algorithms and message digests. By providing codes and digital keys to ensure that what is received is genuine and from the intended sender, the receiver is assured that the data received has not been tampered with during transmission.

Detailed explanation-2: -From the security perspective, asymmetric encryption is undoubtedly better as it ensures authentication and non-repudiation.

Detailed explanation-3: -Symmetric algorithms provide a fairly high level of security while at the same time allowing for messages to be encrypted and decrypted quickly.

Detailed explanation-4: -The primary benefit of public key cryptography is increased data and identity security at scale. What makes the process secure is that the private key is kept secret by its owner, and no one is ever required to reveal or share a private key.

There is 1 question to complete.