0% found this document useful (0 votes)
41 views4 pages

NS Quiz 2

This document contains the questions and answers from a network security quiz taken by Saba Mushtaq at the International Islamic University Islamabad. It discusses the key differences between PGP and other encryption algorithms, the differences between link encryption and end-to-end encryption, that SSH implements security at the transport layer, and that the Authentication Header in IPSec does not provide data confidentiality. The document also notes that in IPSec transport mode, only the IP payload is encrypted, not the original IP header.

Uploaded by

Saba Mushtaq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views4 pages

NS Quiz 2

This document contains the questions and answers from a network security quiz taken by Saba Mushtaq at the International Islamic University Islamabad. It discusses the key differences between PGP and other encryption algorithms, the differences between link encryption and end-to-end encryption, that SSH implements security at the transport layer, and that the Authentication Header in IPSec does not provide data confidentiality. The document also notes that in IPSec transport mode, only the IP payload is encrypted, not the original IP header.

Uploaded by

Saba Mushtaq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INTERNATIONAL ISLAMIC UNIVERSITY ISLAMABAD

SABA MUSHTAQ
201-FBAS/BSIT4/F17
NETWORK SECURITY
QUIZ NO. 02
TUESDAY
DEC,29 2020
QUESTION NO. 01:
How PGP is different from other security algorithms. Please explain
the formation of key ring in PGP algorithm.
ANSWER:
PGP encryption uses a serial combination of hashing, data compression,
symmetric-key cryptography, and finally public-key cryptography; each step uses
one of several supported algorithms. Each public key is bound to a username or an
e-mail address. The first version of this system was generally known as a web of
trust to contrast with the X.509 system, which uses a hierarchical approach based
on certificate authority and which was added to PGP implementations later.
Current versions of PGP encryption include options through an automated key
management server. No secure channels are needed to exchange keys between
users, which makes PGP much easier to use. This is because PGP is based on a
powerful new technology called "public key" cryptography.
QUESTION NO. 02:
How does link encryption differ from end-to-end encryption.
ANSWER:
Link encryption encrypts all the data along a specific communication path, as in a
satellite link, T3 line, or telephone circuit. Not only is the user information
encrypted, but the header, trailers, addresses, and routing data that are part of the
packets are also encrypted. The only traffic not encrypted in this technology is the
data link control messaging information, which includes instructions and
parameters that the different link devices use to synchronize communication
methods. Link encryption provides protection against packet sniffers and
eavesdroppers.
In end-to-end encryption, the headers, addresses, routing, and trailer information
are not encrypted, enabling attackers to learn more about a captured packet and
where it is headed.
QUESTION NO. 03:
The Secure Shell (SSH) protocol implements security at which
network layer?
ANSWER:
The Secure Shell (SSH) is a protocol for secure remote login and other secure
network services over an insecure network. This document describes the SSH
transport layer protocol, which typically runs on top of TCP/IP. The protocol can
be used as a basis for a number of secure network services. It provides strong
encryption, server authentication, and integrity protection. It may also provide
compression.
QUESTION NO. 04:
In the IPSec protocol, which security services are NOT provided by
the Authentication Header(AH)?
ANSWER:
The Authentication Header (AH) is an IPSec protocol that provides data
integrity, data origin authentication, and optional anti-replay services to IP.
Authentication Header (AH) does not provide any data confidentiality (Data
encryption).

QUESTION NO. 05:


An IP packet is secured using IPSec. In which IPSec modes does the
original IP header of the packet get encrypted?
Transport mode, the default mode for IPSec, provides for end-to-end security. It
can secure communications between a client and a server. When using the
transport mode, only the IP payload is encrypted. AH or ESP provides protection
for the IP payload. Typical IP payloads are TCP segments containing a TCP header
and TCP segment data, User Datagram Protocol (UDP) messages containing a
UDP header and UDP message data, and ICMP messages containing an ICMP
header and ICMP message data.

You might also like