Which security service isn’t a goal of the cryptographic systems?
Why would you not contemplate the employ of One-Time Pad Cipher for large messages?
Illustrate the following statement: “DES exhibits strong avalanche effect.”
What is the major threat when RSA (public key cryptography) is employed to securely distribute a DES symmetric key? Illustrate your answer.
Illustrate out the three (3) limitations of the firewall.
Compare packet-filtering and proxy-base firewalls. Provide advantages and drawbacks of both.