Monday, 2 July 2012

CS101 VU Current Assignment No. 5 Spring 2012 Solution

Last Date: 3rd July 2012:
Question No. 1:
A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:
Instructions for Column “a” to “c”:
The latest “technology” or “version” name.
You will define portability in “Yes” or “No”.
Is it “H/w” or S/w based?
Question No. 02
The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.
















Answer 1:
NameColumn aColumn bColumn c
Bluetooth8.1YesH/W
WindowWindows 7NoS/W
3GI OS 5.1.1NoH/W
ModemModem Booster 8.0NoH/W
RAMDDR3NoH/W

Answer 2

S NOKey LengthSymmetric/AsymmetricYear Proposed
RSA2048 bitsAsymmetric1983
AES128 bitsSymmetric2002
Serpent encryption algorithm256 bitsSymmetric1998