Assignment title: Information


1. How will you use public-key encryption to distribute a secret key? Provide an example from popular commercial technology that achieves this? 2. The goal of transposition is diffusion. Explain the functioning of a transposition cipher with a suitable example. Demonstrate how the goal of diffusion is achieved? 3. List limitation of amount of information leaked per second through a convert channel in a multi-access computing system? 4. Describe each of the following four kinds of access control mechanism in terms of a. Ease of determining authorized access during execution b. Ease of adding access for a new subject c. Ease of deleting access by a subject d. Ease of creating a new object to which all subjects by default have access 1. Per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access. 2. Per-object access control list( that I, one list for each object tells all the subjects who have access to that object 3. Access control matrix 4. Capability 5. Briefly explain how the following mechanisms can be used for memory and address protection a. Fence b. Segmentation c. Paging 6. Explain the concepts of classification levels, need to know principle and compartments. How can bell-la padula confidentiality model assist with implementing them? 7. The response "sensitive value; response suppressed" is itself a disclosure. Suggest a manner in which a database management system could suppress responses that reveal sensitive information without disclosing that the responses to certain queries are sensitive? Data can be sensitive, but so ca