NS Quiz 2
NS Quiz 2
SABA MUSHTAQ
201-FBAS/BSIT4/F17
NETWORK SECURITY
QUIZ NO. 02
TUESDAY
DEC,29 2020
QUESTION NO. 01:
How PGP is different from other security algorithms. Please explain
the formation of key ring in PGP algorithm.
ANSWER:
PGP encryption uses a serial combination of hashing, data compression,
symmetric-key cryptography, and finally public-key cryptography; each step uses
one of several supported algorithms. Each public key is bound to a username or an
e-mail address. The first version of this system was generally known as a web of
trust to contrast with the X.509 system, which uses a hierarchical approach based
on certificate authority and which was added to PGP implementations later.
Current versions of PGP encryption include options through an automated key
management server. No secure channels are needed to exchange keys between
users, which makes PGP much easier to use. This is because PGP is based on a
powerful new technology called "public key" cryptography.
QUESTION NO. 02:
How does link encryption differ from end-to-end encryption.
ANSWER:
Link encryption encrypts all the data along a specific communication path, as in a
satellite link, T3 line, or telephone circuit. Not only is the user information
encrypted, but the header, trailers, addresses, and routing data that are part of the
packets are also encrypted. The only traffic not encrypted in this technology is the
data link control messaging information, which includes instructions and
parameters that the different link devices use to synchronize communication
methods. Link encryption provides protection against packet sniffers and
eavesdroppers.
In end-to-end encryption, the headers, addresses, routing, and trailer information
are not encrypted, enabling attackers to learn more about a captured packet and
where it is headed.
QUESTION NO. 03:
The Secure Shell (SSH) protocol implements security at which
network layer?
ANSWER:
The Secure Shell (SSH) is a protocol for secure remote login and other secure
network services over an insecure network. This document describes the SSH
transport layer protocol, which typically runs on top of TCP/IP. The protocol can
be used as a basis for a number of secure network services. It provides strong
encryption, server authentication, and integrity protection. It may also provide
compression.
QUESTION NO. 04:
In the IPSec protocol, which security services are NOT provided by
the Authentication Header(AH)?
ANSWER:
The Authentication Header (AH) is an IPSec protocol that provides data
integrity, data origin authentication, and optional anti-replay services to IP.
Authentication Header (AH) does not provide any data confidentiality (Data
encryption).