Theory Assignment 3
Theory Assignment 3
2
International Institute of Information Technology (I IT), Pune
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year 2024-25 Semester II
LIST OF THEORY ASSIGNMENTS
Class: TE (2019) Div-B Course Name: Computer Network and Security
Assignment 3 (Unit 5)
In a public key cryptosystem using RSA, given N=187 and the encryption key
Q1. (E) as 17, find out the corresponding private key (D). BTL3
Let the given data be P=11, q=19 and plain text to be sent is 40. Assume
public key e as 23. Using RSA algorithm determine the cipher text for given
Q2. BTL3
plain text. Also perform the reverse process of finding plain text from cipher
text.
Users A and B use the Diffie-Hellman key exchange technique with a common
prime
q = 71 and a primitive root a = 7.
Q3. a. If user A has private key XA = 5, what is A’s public key YA? BTL3
b. If user B has private key XB = 12, what is B’s public key YB?
c. What is the shared secret key?
In AES there are four transformation used in rounds, let current state matrix is
given below find state matrix after applying shift rows transformation. Also
list and explain other transformation used in AES
Q4. BTL3
CO311.5 10
Evaluate the working of the DES round function by analyzing its components
(expansion, substitution, permutation, and key mixing). How do these
Q5. BTL4
operations contribute to the overall security of the algorithm, and what might
be the potential vulnerabilities or weaknesses introduced by each step?
Analyze the process of constructing a digital certificate using OpenSSL and
Q6. create self signed digital cerificate using openssl? Write the steps you BTL4
followed in creation of digital cerificate
Relate the AES (Advanced Encryption Standard) and DES (Data Encryption
Standard) algorithms in terms of their security features, performance, and
Q7. suitability for modern applications. Analyze the potential vulnerabilities of BTL4
DES in modern cryptography and suggest how AES addresses these
weaknesses.
Write the steps involved in the key exchange process and demonstrate how
two parties, Alice and Bob, can securely exchange a shared secret over an
Q8. BTL3
insecure channel. Also, evaluate the potential vulnerabilities or weaknesses of
the Diffie-Hellman protocol.
Evaluate how the RSA digital signature scheme ensures the authenticity and
integrity of a message, and discuss potential vulnerabilities in the system.
Q9. BTL4
Suggest improvements to enhance the security of RSA-based digital
signatures in modern applications.
Consider the Indian Public Key Infrastructure (PKI) scheme, Discuss its
implementation, key components, and role in securing digital communications
Q10. in the country. Analyze the challenges and potential vulnerabilities in India’s BTL4
PKI system and propose improvements or enhancements to ensure better
security and scalability
Assignment 3 (Unit 6)
Mr. B wants to slow down website X and does not want steal any information
Q1. from website . Identify the type of attck Mr. B planning for ? How it to BTL3
mitigate the attack?
The company CEO's email may look important, but it may make a strange ask
like encouraging the employee to pick up gift cards. It may also stress urgency
Q2. BTL3
and discretion. Identify the type of cyber attak possible in this sceanrio and
discuss preventive measures to avoid such type of attack
SQL injection is the placement of malicious code in SQL statements, via web
Q3. page input. Demonstrate SQL injection attack with suitable SQL queries . BTL3
Also discuss how to protect web site from SQL Injection attack
The attacker waits for a victim to log in to an application, such as for banking
or email, and then steals the session cookie. The attacker then uses the cookie
Q4. to log in to the same account owned by the victim but instead from the BTL3
attacker's browser. Which type of attack happen in this scenario. Discuss how
to prevent such type of attack.
You work as a cybersecurity expert for a healthcare provider. The
organization has recently been hit by a ransomware attack. Employees
received an email attachment, which, when opened, encrypted several files on
Q5. the network. A ransom note has been left on the systems, demanding payment BTL3
in cryptocurrency in exchange for the decryption keys. What is a ransomware
attack, and how does it affect an organization? Discuss long-term measures
can the organization implement to prevent future ransomware attacks?
Cyber espionage involves the use of cyber techniques and technologies to
covertly obtain sensitive or classified information from individuals,
organizations, or governments, often for political, military, or economic gain.
As a cybersecurity expert, you are tasked with analyzing a recent cyber CO311.6 10
Q6. espionage incident where hackers infiltrated a government agency and stole BTL4
confidential national security data. Discuss the common tactics, techniques
used by attackers in cyber espionage campaigns. Provide at least one examples
of real-world cyber espionage incidents and explain how the attackers carried
out their objectives.
Cyber terrorism involves the use of digital technology, networks, and the
internet to carry out attacks that cause significant harm to national security,
critical infrastructure, and public safety. As a cybersecurity analyst, you are
tasked with assessing the threat of cyber terrorism and its potential
Q7. BTL4
consequences on a our country’s infrastructure, economy, and society.Provide
at least one real-world examples of cyber terrorism incidents and suggest the
countermeasures that governments and organizations should adopt to defend
such attack.
The Information Technology Act, 2008 (IT Act 2008), is the primary law in
India that governs the use of electronic communications, digital signatures, and
Q8. BTL4
cybercrimes.Discuss how the IT Act, 2008 addresses cybercrimes and cyber
offenses also Analyze the role of digital signatures under the IT Act, 2008