- National Institute for Standards Technology put out a call for proposals for
new crypto system with following requirements. - Must provide a high level of security (i.e. difficult to decrypt in finite time).
- Must be completely specified and easily understood.
- Security must reside in key – Not in algorithm
- Must be available for all users
- Adaptable for use in diverse applications e.g.credit cards.
- Implementable economically in electronic devices.
- Must be efficient to use as both software and hardware.
- Must allow one to validate it.
- Must be exportable.
- No trap door.
- In October 2000 it announced the selection of an algorithm – called Rijin
dael(Pronounce RAIN DOLL) as new Advance Encryption Standard (AES).
5)A university registrar’s office maintains data about the following entities: (a) courses, including number, title, credits, syllabus, and prerequisites; (b) course offerings, including course number, year, semester, section number, instructor(s), timings, and classroom; (c) students, including student-id, name, and program; and (d) instructors, including identification number, name, department, and title. Further, the enrollment of students in courses and grades awarded to students in each course they are enrolled for must be appropriately modeled. Construct an E-R diagram for the registrar’s office. Document all assumptions that you make about the mapping constraints. Answer: In the answer given here, the main entity sets are student, course, course-offering, and instructor. The entity set course-offering is a weak entity set dependent on course. The assumptions made are : a class meets only at one particular place and time. This E - R diagram cannot model a class meet
Comments
Post a Comment