css answer
css answer
1. Preimage Resistance – Cannot find the original input from its hash.
2. Second Preimage Resistance – Cannot find another input with the same hash.
3. Collision Resistance – Cannot find two different inputs with the same hash.
8. Secure Against Attacks – Should resist length extension and other attacks.
• Ensures that a sender cannot deny sending a message and a receiver cannot deny receiving it.
• Prevents entities from falsely claiming they did not perform an action.
Authentication
Security services provide protection against various security threats. According to ISO 7498-2 (OSI
Security Architecture), security services can be classified as:
• Authentication: Ensures that the sender and receiver of a message are who they claim to be.
2. Security Mechanisms:
Security mechanisms implement security services to counteract threats. Some key mechanisms
include:
• Encryption: Converts plaintext into ciphertext to protect confidentiality (e.g., AES, RSA).
• Hashing: Ensures data integrity using hash functions (e.g., SHA-256, MD5).
• Digital Signatures: Provides authentication, integrity, and non-repudiation (e.g., RSA, DSA).
• Access Control Lists (ACLs): Defines rules for user access to resources.
6. List the Security Goals.
Ans:-
1. Confidentiality – Ensuring that information is accessible only to those authorized to access it
(e.g., encryption).
2. Integrity – Ensuring that data is not altered or tampered with during transmission or storage
(e.g., hash functions, digital signatures).
3. Availability – Ensuring that information and systems are accessible when needed (e.g.,
protection against DoS attacks).
4. Authentication – Verifying the identity of users or systems before granting access (e.g.,
passwords, biometrics, certificates).
5. Non-Repudiation – Preventing denial of an action by ensuring proof of origin and delivery
(e.g., digital signatures, audit logs).
6. Authorization – Granting specific permissions to users based on their identity and roles (e.g.,
access control lists).
DES Decryption
• The decryption process follows the same steps as encryption but with the subkeys used
in reverse order.
1. Components of Kerberos
Kerberos consists of three main components:
1. Key Distribution Center (KDC) – The central authority responsible for authentication and
ticket granting.
o Authentication Server (AS) – Verifies user identity and issues a Ticket Granting
Ticket (TGT).
o Ticket Granting Server (TGS) – Issues service tickets after verifying the TGT.
2. Client – The entity requesting access to a service.
3. Server (Service Provider) – The resource that the client wants to access securely.
2. Working of Kerberos
The authentication process involves multiple steps:
1. Initial Authentication:
o The client sends an authentication request to the AS.
o AS verifies credentials and sends back a TGT encrypted with the client’s secret
key.
2. Service Request:
o The client presents the TGT to the TGS for access to a specific service.
o TGS verifies the TGT and issues a service ticket.
3. Access Granting:
o The client presents the service ticket to the server.
o The server decrypts and verifies the ticket.
o If valid, the client is granted access.
Vulnerability Mitigation
6. Applications of Kerberos
• Used in Windows Active Directory for authentication.
• Integrated with SSH for secure remote logins.
• Used in enterprise Single Sign-On (SSO) systems.
• Secures database access in systems like PostgreSQL and Oracle.