• Internal Code :
• Subject Code : U30606
• University :
• Subject Name : IT & Computer Science

### Question 1: Correct answer is (b) {(KPbB) KPrS mod KPbS, G2, KBS, KPrB, {(KPbB) KPrS mod KPbS}K1, NA , NB)

Explanation: …

The principal K sends its identity to KPbS. NA prepare the nonce and this nonce sends to the P. then encryption takes place and P then encrypts NA and NB with the help of key K1 and after that, P sends this encrypted value x to NA. NB then encrypts P, KPbB, x with KPbB and NB then send this encrypted value to Y and it also sends this encrypted key to the authentication server S. The most important consideration is that S knows both the secret keys, it starts the decryption of y with KPrBS, and recovers K, then it starts the decryption of x with KPS and by the help of this process it recovers P, Q, n. Now, the server S that we discussed earlier, server S then start encryptions with P, Q, n with k1, and then it forwards the encrypted value to KPbS. KPbS then starts computing and calculates KPbS, Na, Nb and the verification process start with g1, g2, g3. These three values g1, g2, and g3 then veriﬁes the scenario that if this value is equal to the value received from K. After the computation, If both values are equal, then authentication succeeds, else it fails.

### Question 2: Correct answer is (h) Both A and B authenticate each other by knowing each other’s identities)

Explanation: …

In the given scenario, the connection establishes between A and B. First of all, “A” wants to establish a connection with B. In this context, “A” send details to the “B” and B recognize the details and verify the details. And if there is no issue with the details and all the details are verified then B send their detail to the A. When A and B both receive details then they exchange certificate and acknowledgment done.

### Question 3: Correct answer is (g) At time point 3, S can produce evidence that that A has access to key K )

Explanation: …

In this situation “S provides the evidence that the B received the message”. It is generated by the delivery agent. This delivery agent is also known as TTP and usually TTP generated the evidence. The evidence in the form of the authorization will be sent to A that B is alive.

### Question 4: The correct answer is (d) The secrecy of P3. K2 is compromised, but P2. K2 and P1. K2 would remain secret since K1 is refreshed after each run, therefore P3. K1 is different from P2.K1 and is different from P1.K1 )

Explanation: …

In this condition k2 would not be affected by the P1 and P2 because they both are two separated functions. If P3 compromises at any stage, then there is no effect because they can be refreshed. If

P3 was not compromised then it directly affects the system functions K2. But in this situation, P1 and p2 are the two separate entities and because of this, it may not affect the K2.

### Question 5: Correct answer is (a) 3. B ® S: (A, {(B, {K2}KpbA)}KpbS))

Explanation: …

A sends its identity to S, it also sends the packet which is encrypted with the key, Kpb, and the key shared with S. The current timestamp contains this packet that we discussed above, A is the preferred partner in the communication channel. After that the key KpbA is generated randomly, and this is used by the communication process between A and B. S tries to obtain the KAB and this can be achieved when S decrypts. If S decrypts then it obtain the KpbS and then it forward this key to the B and this encrypted key forward in the encrypted packet which also contains the current timestamp and the identity of A. Now, B start decrypting the message with the help of key and then it shares with the S, then S retrieve the identity of the other party and the key K.

### Question 6: Correct answer is (a) 1. A ® B: (C, {NA}KAB))

Explanation: …

C wants to enter in the communication of A and B to give it harm. So, C is the harmful packet.

### Question 7: Correct answer is (a) (l read from z), (l write to g), (g read from l), (g read from e), (e write to c), (c write to b), (a read from b)

Explanation: …

In this situation, the proper sequence is the most important factor. As it is mentioned above, that access achieves because of proper sequence. “Z goes into a sequence so that why information leak”. The working of this scenario is depended on the proper sequence. If there is any entity that goes out from the sequence so there is a chance that information may be leaked.

### Question 8: Correct answer is (d) Unified Host and Network Dataset)

Explanation: …

The working of unified host and Network datasets are different in this situation but they working for the same cause. Unified host resists duplication and network data avoid the system and harmful person to enter in the system. The work of the unified host is to avoid duplication and if there any duplication then a unified host resist and make it save from the harmful effect. The work of the network data is to ensure that no harmful person can enter into the system.

Remember, at the centre of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help

## Get It Done! Today

Not Specific >5000
• 1,212,718Orders

• 4.9/5Rating

• 5,063Experts

### Highlights

• 21 Step Quality Check
• 2000+ Ph.D Experts
• Live Expert Sessions
• Dedicated App
• Earn while you Learn with us
• Confidentiality Agreement
• Money Back Guarantee
• Customer Feedback

### Just Pay for your Assignment

• Turnitin Report

\$10.00

\$9.00Per Page
• Consultation with Expert

\$35.00Per Hour
• Live Session 1-on-1

\$40.00Per 30 min.
• Quality Check

\$25.00
• Total

Free
• Let's Start

+ View More

Get
500 Words Free

Explore MASS
Order Now

Request Callback