Cryptography & Network Security new Organizer 2024
Cryptography & Network Security new Organizer 2024
NETWORK SECURITY
Firewall 107
POPULAR PUBLICATIONS
1. If
the principle of to be onsurod the contents of a message
modified while in transit. must not b
WBUT 2009)
a) confidentiality b) authontication c) integrity d) access
Answer: (c) control
8. Interception is an
attack on
a) availability b) confidentiality WBUT 2016]
Answer: (b) c) authenticity d) integrity
C&NS-2
CRYPIOGRAPHY& NETWORK SECURITY
9. If the recipient of message has to be satisfied with the identity of the sende the
principle of comes into picture. [WBUT 2016]
a) confidentiality b) authentication c) integrity d) access control
Answer: (b)
10. The four primary security principles rlated to a mdssage are
[WBUT 2016, 2018]
a)confidentiality, authentication, integrity and non-repudiation
b) confidentiality, access control, non-repudiation and integrity
c) authentication, authorization, non-repudiation and availability
d) availability, access control, authorization and authentication
Answer: (a)
11. In which attack,there is no modification to message contents?
WBUT 2016, 2019]
passive
a) b) active c) both of these d) none of these
Answer: (a)
12. A Worm modify a program. WBUT 2016,20171
a) does not b) does c) may d) may or may not
Answer: (a)
[WBUT 2017]
13. The attack is related to confidentiality.
a) interception b) fabrication c) modification d) interruption
Answer: (a)
14. DOSattacks are caused by WBUT 2017, 2019]
a) authentication b)fabrication c) alteration d) replay attacks
Answer: (b)
15. Interception is an attack on WBUT 2019]
a) availability b) authentication c) confidentiality d) access control
Answer: (c)
C&NS-3
POPULAR PUBLICATIONS
C&NS-4
SECURITY
CRYPTOGRAPHY& NETWORK
Passive Attacks
A passive attack monitors unencrvpted trafTic and looks for clear-text passwords and
scnsitive information that can be uscd in other types of attacks. Passive attacks include
trafiic analysis, monitoring of unprotcclcd communications, decrypting weakly encrypted
as passwords. Passive interception
traffic, and capturing authentication information such
see upcoming actions. Passive attacks result
of network opcrations enables adversarics to or
in the disclosure of information or data files to an attacker without the conscnt
knowledge of the user.
New conncction
C&NS-5
POPULAR PUBLICATIONS
Answer:
I" Part: are quite different
Both attacks arc attempts to get user names and passwords, but they
Phishing attacks usually will involve an email hat appears to be from a company with
which we do business prompting us to take action and log in to our account with the lint
provided in the cmail. The Web site we visit is not the real site but a cleverly designed
imposter site that may secm real to us, so we will enter our username and password
which is then captured by the attacker.
2ne Part:
Pharming is different in that it can happen when we arc going to a legitimate Web site
even when we have typed the URL of the Web site oursclves. In a pharming attack. the
criminal "hijacks" the intended site's DNS (domain name system) scrver. The result is
that we are redirected an imposter site that looks like our intended site. Many won't
notice any diflerence, willenter their username and password as usual, and the attacker
captures it.
5. What are the different types of attacks oncomputer and network systems?
WBUT 2014]
Answer:
Active attacks alter the system or network operations
while passive attack gathers
information about the system without altering the system.
Active attack can involve
infecting the system with virus or worms or can span upto
drive. Normally passive attacks remain undetected. deleting the entire hard
Active attack can flood the entire
network with unnecessary packets and can render
it slow while passive attack can
sniff network packets without changing them.
Different types of active attack
includes: masquerade, replay, DOS, DDOS,
can know the presence alteration of message. Passive attackers
of certain. user accounts along with thcir password
active attackers use
these information to render the system useless while
Eavesdropping or sniffing or snooping: Capturing to the owner.
sensitive information like passwords, of. network packets to obtain
plain text messages, other confidential
information.
Spoofing: Act of hiding the original contents
identification in order to bypass of IP, MAC, protocols with false
certain security checks, impersonate
computing system is called spoofing. By another
forging the header so it contains a different
address, an attacker can make
it appear that the packet was sent
machine. The machine that by a different
receives spoofed packets will
forged source address. send a response back to the
Interception: attacker monitors the strcam
and gathers information which can
used to organize the attack later on. In be
this kind of attack the packets intended for the
recipient are captured or altered
by the attacker in the middle
packets. intercepting the
C&NS-6
CRYYTOGRAPHY &
NEIWORK SECURITY
Modification Attacks: the data packets are modified or altered by the attacker
carn intercept and alter
there is no strong encryption method provided and the attacker
the contents violating the integrity of message.
source of the
Repudiation Attacks: the sender of the message denies that he is the
message. Here the authenticity of the message is violated. Digital signaturcs are used
to prevent these kind of' attack.
Denial-of-Service (DOS) Aacks and Distributcd Denia-of-Servicc (DDOS)
server to flood the network
Attacks: DOS attacks arc organized between clicnt and
requcsts from spoote
witli unnecessary packets. The server is overwhelmed with arc different
addresses and thercby fails to reply scrvices to the original clients. There
catcgories of DOS attacks. Some send 1CMP ccho packets in largc quantity while
are send in large
others send SYN packets for TCP connections. Some IP packets
server fails to reassemble the
numbers so that original packct size eNcccds and
packets.
Back door Attacks: attackers plat root kits or Trojans to take control ofopenthe system
a port
anonymously and without the knowledge of the attacker. They normally
or a service which are later exploitcd.
some message, an
Replay attack or Man-in-the-Middle Attacks: Alice sends Bob
receiver of original
intruder can act in between Alice and Bob resembling sender and is either
message thereby taking control of entire communication that is transmission
or delayed. A rcplay attack occurs when an
maliciously or fraudulcntly repcated
replays the stream tO
attacker copies a stream of messages between two parties and
one or more of the parties. an organization. Normally,
Inside attack takes place from inside of secured perimeters of
resources of the organization. This may include selling of
Insider has more access to any competitor. Also time taken by an
confidential information of an organization to
an outside intruder. Outside attack takes place from
inside attacker is always less than
is less than the previous
remote site or from Internet. Resources gathcred by the attacker
case. Outside attack may bypass firewall and NAT.
WBUT 2016]
6. What is availability?
Answer:
at Authentify is to provide uninterrupted service 24 hours
By means of the term our goal is inevitable, our
per day, 7 days a weck, 365 days a ycar. While system maintenarce
99.9% or better.
service level agreements reflect up-time commitments of
[WBUT 2019]
7.What are Brute force attack and Man-in-the-Middle attack?
Answer:
1" Part:
In cryptography, a brute-force attack,
or exhaustive key search, is a cryptanalytic
any encrypted data (except for data encrypted
attack that can, in theory, be uscd against
in an information-theoretically
secure manner). Such an attack might be used when it is
an encryption system (if any exist)
not possible to take advantage of other weaknesses in
that would make the task casier. It consists of
systematically checking all possible
C&NS-7
POPULAR PUBLICATIONS
keys passwords until the correct one is found. In the worst casc, this would involve
or
keep it going. Because a virus is spread by human action people will unknowingly
continue the spread of acomputer virus by sharing infecting files or sending emails with
viruses as attachments in the enmail.
A worm is similar lo a virus by design and is considercd to be a sub-class of a virus.
Worns sprcad from computer to computer, but unlike a virus, it has the capability to
travel without any human action. A worm takes advantage of file or information transport
fcatures on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itsclf on your system, so
rather than your computer sending out a single worm, it could send out hundreds or
thousands of copies of itself, creating a huge devastating effect. One example would be
for a worm to send a copy of itsclf to cveryone listed in your e-mail address book. Then.,
the worm replicates and sends itself out to cveryone listed in cach of the receiver's
address book, and the maniest continucs on down the linc.
Duc to the copying nature of a worm and its capability to travel across networks the end
result in most cases is that the worm consumes too much system memory (or network
bandwidth). causing Web servers, nctwork servers and indiidual computers to stop
responding. In recent wom attacks such as the much-talked-about Blaster Worm, the
wom has been designed to tunnel into your system and allow malicious users to control
your computer remotely.
2. a) What are the key principles of security? WBUT 2014, 2016, 2019]
OR,
Discuss the basic principle of security. [WBUT 2015]
OR,
Discuss about the four basic principles related to the security of a message.
[WBUT 2016]
Answer: to
Confidentiality: Confidentiality refers to prcventing the disclosure of information
unauthorized individuals or systems. Confidentiality is necessary for maintaining the
privacy of the people whose personal information is held in the system.
means maintaining and assuring the
Integrity: In information sccurity, data integrity
accuracy and consistency of data over its entire life-cycle. This means that data cannot be
modified in an unauthorized or undetected manner
purpose, the information must be
Availability: For any information system to serve its
available when it is needed. This means that the computing systems used to store and
process the information, the security controls used to protect it, and the communication
to
channcls used to access it must be functioning correctly. High availability systems aim
remain available at all times, preventing service disruptions due to power outages,
hardware failures, and system upgrades. Ensuring availability also involves preventing
denial-of-service attacks, such as a flood of incoming messages to the targct system
essentially forcing it to shut down.
is necessary to
Authenticity: In computing, e-Business, and information security, it
ensure that the data, transactions, communications or documents (electronic or physical)
are genuine. It is also important for authenticity to validate that both parties involved
are
C&NS-9
POPULAR PUBLICATIONS
who they claim to be. Somc information security systems incorporate authentication
features such as "digital signatures", which give cvidence that the message data is
proper signing key.
genuine and was sent by someone possessing the
Non-repudiation: In law, non-repudiation inplies onc's intention to fulfill thcir
obligations to a contract. It also implies that onc party of a tansaction cannot deny
having reccived a transaction nor can the other party deny having sent a transaction. It is
not, for instance, suflicient to show that the message matches a digital signature signed
with the sender's private key, and thus only the sender could have sent the message and
nobody cise could have altered it in transit. The alleged sender could in retum
demonstrate that the digital signature algorithm is vulnerable or lawcd, or allege or prove
that his signing key has been compromised. The fault for these violations may or may not
lie with the sender himself, and such assertions may or may not relieve the sender of
liability, but the asscrion would invalidate the claim that the signature necessarily proves
authenticity and integrity and thus prevents repudiation.
C&NS-10
CEYTOGRAPHY NETWORKSECURIIY
Parasitic Virus: Parasitic virus attacks the file using the extensions .exe or .com. t
spreads the virus by attaching itself to another program. It is also called a file virus. The
Parasitic virus hides them in a file and runs along with the file. To avoid this virus, users
should avoid clicking unwanted links.
Examples: Virut, sality and vetor.
a
Stealth Virus: Stealth virus is computer viruses that are hidden inside file ain the
operating system. It steals the data, changes the encryption of data, and undergoes self
modification of the code. It is unnoticcable by the users and usually hide in the boot part
scanner software to protect the
of the system. So, it nceds an updated strong antivirus and
system from the stcalth virus.
Example: Brain
Macro Virus: It is a type of virus coded in the macro language. The Macro language is
applications
mainly used for designing software applications. It affects only the softwareuse
virus the same
irrespective of the operating system used. As both software and the
language they enter the application and affect them.
Examples: Melissa Virus and Nuclcar virus.
C&NS-11
POPULARPUBLICATIONS
Polymorphic Virus: The Polymorphic virus enters the machine via infected systems,
cornupted files, and emails. It affects thec data, and functions and changes the encryption
the data. They have a complex design structure in such way that any protcction
of a
system could not find this virus. They get modified according to the softwarc.
Examplcs: VIRLOCK, VOBFUS, and BAGLE
Source code Virus: The source code of the infected computer gets changed or affected
This type of virus is rare and it is very difficult to remove them when a computer is
affected by it. The causes of source code virus is hijacking the machine and corrupts iL.
Resident Virus: The Resident virus is a type of malware that targets the memory file of
the computer system. I is considered the worst one as they get attached to thc files of
antivirus softwarc and corrupt them too.
Examples: Meve, CMJ and Randex
Tunneling Virus: The Tunneling virus finds that the antivirus is dctecting it as malicious
software. So it enters into the antivirus program, intercepts its function, and thus avoids
running the antivirus software.
Example: Frodo
Multipartite Virus: It is the fastest virus that affects the executables files and system
boot sector simultaneously. It affects multiple parts namely
the memory and the operating
system.
Examples: Invader and Flip
b) o
Refer Questions No. 5 ofShort Answer Type Questions.
5.Discuss security mechanism for a network. (WBUT 2023]
Answer:
Network security is usually based on limiting or blocking operations fromn
remote
systems. The following figure describes the sccurity restrictions you can
that impose on
remote operations.
C&NS-12
CRYITOGRAPHY & NETWORK SECURITY
Can Ilog m?
Can I copy
that file?
C&NS-13
POPULAR PUBLICATIONS
b) Malicious programs:
Malware, shorn for malicious sofiware, is an umbrella ferm used to refer to a varicty
of
forms of hostile or intrusive sofware. including computer viruses, worms,
Trojan
hoses, ransom warc, spyware, adware, scare ware, and other malicious programs. It can
take the fom of code, seripts, active content, and other software. Malware is defined b
its malicious intent, acting against the requirements of the computer user - and so does
not incude software that causes unintentional harn due to some deficiency. ProgramE
supplicd officially by companies can be considered malware if they secretly act agains
the interests of the computer uscr. An example is the Sony rootkit, a Trojan horse
embedded into CDs sold by Sony, which silently installed and concealed itself om
purchasers' computers with the intention of preventing illicit copying: it also reported on
Users' listening habits, and unintentionally created vulnerabilities that were exploitéd by
unrelated malware. Software such as anti-virus and firewalls are used to protect against
activity identified as malicious, and to recover from attacks. Thc best-known types of
malware, viruses and worms, are known for the manner in which they spread, rather than
any specific types of behavior. The term computer virus is used for a program
that
embeds itself in some other executable software (including the operating systemn itself) on
the target system without the.user's consent and when that is run causes the virus to
spread to other executables. On the other hand, a worm is a starnd-alone malware program
that actively transmits itself over a network to infect other computers. These definitions
lead to the observation that a virus requires the user to run an
infected program or
operating system for the virus to spread, whereasa worm spreads itself.
d) Principles of Security:
Let us assume that person A
wants to send a check worth S 100 to another person B.
normally, what are the a factors that A and B will think of, in such a case? A will write
the check for $ 100, put it inside an envelopc, and send it to B.
A will like to ensure that no one except B gets the envelope, and even someone
if
cisc gets it, she does not come to know about the details of the check. This is the
principle of confidentiality.
and B will further like to make sure that no one can tamper with the contents
A
of the check (such as its amount, date, signature, name of the payee, etc.). This is
C&NS-14
SECURITY
CRYTOGRAPHY& NETWORK
principle of authentication.
What will happen tonnorrow if B deposits the check in her account, the money 1s
transfered from A's account to B's account. and then A refuses having
writtcnsent the check? The court of law will use A's signature to disallow A to
refute this claim, and sctle the dispute. This is the principle of non-nepudiation.
access control and
These are the four chief principlcs of security. Therc arc two more,
a messagc, but are linked to the overall
availability, which arc not related to particular
sVstem as a whole.
c)DNS spoofing:
that can force victims to
DNS spoofing is another one of thc man-in-the-middle attacks
a one.
navigate to a fake website purporting to be real
information to a victim in response to
DNS spoofing is based on presenting fake DNS one.
request and, as a result, forcing them to visit a site which is not the real
their DNS is
suppose the user requests the IP address of mail.yahoo.com, which
As an example, query before
to XX.XX.XX.XX. But the attacker would respond to the DNS
supposed be system
response arrives with a spoofed address of YY.YY.YY.YY. The user's
the actual is
a connection rcquest to YY.YY.YY.YY, thinking that mail.yahoo.com
will make site
the user is routed to a complctely diferent
located at that IP address. So effectively,
from the one-which he
or she originally intended to visit.
a
communication occurs when the system requests the IP of particular
Normal DNS of that website. The
server responds back with the actual IP address response. With
website and the DNS the IP address it received as a
system then connects to the website through response that
intercepts the DNS requcst and sends out a
DNS sp0ofing, the attacker a spoofed IP address.
doesn't contain the actual lP actual, but
spoofing: secure
To secure yourself from DNS systems in the internal LAN must be kept
systems: the
Secure your internal security patches from the different vendos.
Without this
latest will be
and updated with the one the systems in the internal LAN
a chance of systems,
protection, there is DNS spoofing attacks on other LAN
compromised and stait launching
infections.
further increasing the
intrusion prevention systems are
detection systems and
Deploy IDS/IPS: intrusion inside the
attacks, so they need to be deployed
spoofing
capable of handling DNS network.
as well as on the perimeter of the
network
C&NS-15
POPULAR PUBLICATIONS
DNSSEC: DNSSEC is
a very sccurc technology that can be used to allo.
on DNSservers. Through DNSSEC
.
digitally signed DNS records to be published
servers from
can also prevent bogus zone transfers and hcnce prevent DNS geting
infected themselves.
C&NS-16
CRYPTOGRAPHY & NETWORK SECURITY
C&NS-17
POPULAR PUBLICATIONS
10. is based on the idea of hiding the rolationship between the cipherteyt
and the key WBUT 2015]
a) Diffusion b) Confusion
c) Both (a) and (b) d) None of these
Answer: (a)
13. Conversion of cipher text into plain text is called as WBUT 2016, 2018]
a) encryption b) decryption c) cryptography d)cryptanalyst
Answer: (b)
14. In substitution cipher, which of the following happens? (WBUT 2016]
a) characters are replaced by other characters
b) rows are replaced by columns
c) columns are replaced by columns
d) none of these
Answer: (a)
C&NS-I8
CRYPTOGRAPHY&NETWORK SECURITY
2. How does digital envelope exploit the advantages of the both symmetric and
asymmetric key cryptography? [WBUT 2014]
Answer:
Two primary kinds of encryption are symmetric key and asymmetric key. Symmetric key
encryption uses the same key to encrypt and to decrypt. Asymmetric key encryption
creates the key in two complementary pieces, Iike the two pieces of a raggedly tom dollar
bil. One picce is the public key, because no security is lost by publishing it for anyone to
know, and the other is thie private key, because you mustguard it from discovery. If we
encrypt with a given public key, somcone can decrypt only with the corresponding
private key; no other key, including the public key used to encrypt the information, can
successfully decrypt it. That simple difference in key use is he most significant
breakthrough in security technology in 2000 years.
C&NS-20
CRYPTOGRAPHY & NETWORK SECURITY
2nd Part: Refer to Question No. 1(a) ofLong Answer Type Questions.
to computationally secure?
6. When an encryption algorithm is said be WBUT 2014, 2018]
ROT13
Plaintext |O Y |<|#|a|
A G E R
Key +3 +3 +3 +3 +3 +3 +3
Ciphertext Y R B D H U
|Plaintext A
B|C DEFG
|H|I J K|L|M
|Key |T OE|UNZIJA
NOP QRs TIUV|W|XY |Z
|GXP QY RHVS MDFCJ WB|K|L|
Using this substitution cipher to encrypt VOYAGER would give us
these results:
Plaintext A oGlx R
Ciphertext H K T X N M
Transpositionciphers
Transposition ciphers encrypt plaintext by moving small pieces
of the message around.
Anagrams are a primitive transposition cipher.
This table shows "VOYAGER" being encrypted
with a primitive transposition cipher
where every two letters are switched with each other:
o
VA
YAGER
YEGR R
C&NS-22
CRYPTOGRAPHY &
NETWORK SECURITY
C&NS-23
POPULAR PUBLICATIONS
11. What are the roles of the public and private key? wBUT2018]
Answer:
A
user's private key is kept private and known only to the user. The user's public
key
ihis
made available to others to use. The private key can be used
to encrypt
can be verified by anyone with thc public key. Or the public key can
a signature
be used to encrypt
information that can only be decrypted by the possessor of the private key
C&NS-24
CRYPTOGRAPHY &
NEIWORK SECURITY
C&NS-25
POPULARPUBLICATIONS
Asymmetriccipher:
In an asymmetric cipher, the encryption key and
the decryption keys are separate.
In an asymmetric system, cach person has two
keys. One key, the public key, is shared
publicly. The sccond key, the private key, should never
be shared with anyone. When you
send a message using asymmetric cryptography, you
encrypt the message using the
recipients public key.
The recipient then decrypts the message
using his private key.
That is why the system is called asymmetric.
(at lcast for high quality algorithms) Ino one without the decrypting kcy (aka, the private
key) could decrypt the message.
b) Asymmetric key can be used to verify the identity of the other communicating party.
Asymmetric algorithms encrypt and decrypt with different keys. Data is encrypted with a
are much
public key, and decrypted with a private key. Generally, symmetric algorithms
ones. In practice they are often used
faster to exccute on a computer than asymmetric a randomly generated
together, so that a public-key algorithm is used to cncrypt
message using a
encryption key, and the random key is used to encrypt the actual
symmetric algorithm. This is sometimes called hybrid encryption.
Answer:
1" Part:
Key Wrap constructions are a class of symmetric cncryption algorithms are
designed to
intended
encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms
for applications such as (a) protecting keys while in untrusted
storage, or (b) transmitting
are typically built from
keys over untrusted communications networks. The constructions
standard primitives such as block ciphers and cryptographic hash functions.
should not be confused with the more commonly knownasymmetric (public-key) key
can be used in a
encapsulation algorithms (e.g., PSEC-KEM). Key Wrap algorithms
similar application:to securely transport asession key by encrypting under a long-term
it
encryption key.
C&NS-27
POPULAR PUBLICATIONS
2nd Part:
This applies to mee
Key wrapping is uscd in pure symnctric cncryption scenarios.
applications using password based cncryption.
One role of key management is to ensure that the same key used in cncrypting a message
by a sender is the same key used to decrypt the message by the intended recciver. Thus, if
Terry and Pat wish to exchange encrypted messages, cach must be cquipped to decrypt
reccived messages and to encrypt sent messagcs. If they use a cipher, they will need
appropriate keys. The problem is lhow to exchange whatever keys or other information
are necded so that no one else can obtain acopy.
One solution is to protect the session key with a special purpose long-term usc key called
a key encrypting key (KEK). KEKs are used as part of key distribution or key exchange.
The process of using a KEK to protect session keys is called key wrapping. Key
Wrapping uses symmetric ciphers lo securely encrypt (thus encapsulating) a plaintext key
along wilh any associated integrity information and data. One application for key
Wrapping is protecting session keys in untrusted storage or when sending over an
untrusted transport. Key wrapping or encapsulation using a KEK can be acconmplished
using cither symmetric or asymmetric ciphers. If the cipher is åsymmetric KEK, both the
sender and the receiver will nced a copy of the same key. If using an asymmetric cipher.,
with publichprivate key properties, to encapsulate a session key both the sender and the
receiver will need the other's public key.
C&NS-28
CRYrTOGRAPHY &
NETWORK SECURITY
2d Part:
In the cipher-block chaining (CBC) mode, each block of plaintext is XORed with the
previous cipher text block before being encrypted. This way, each cipher text block is
depcndent on all plaintext blocks proccssed up to that point. Also, to make each message
uniquc, an initialization vector nmust be used in the first block.
CBC has becn the most conmmonly used mode of operation. Its main drawbacks are that
encryption is sequential (i.c., it cannot be parallclized), and that the message must be
padded toa multiple ofthe ciplher block size. Onc way to handle this last issuc is through
the method known as cipher lest stcaling.
Note that a one-bit change in a plaintext affects all following cipher text blocks. A
plaintext can be recovered from just two adjacent blocks of cipher text. As a
consequence, decryption can be parallclized, and a one-bit change to the cipher text
causes conmplete coruption of the corresponding block of plaintext, and inverts the
corresponding bit in the following block of plaintext.
Plaintext Plaintext Plaintext
Block cipher
Block cipher Block cipher Key
Key Key cncryption
cncryption cncryplion
T1
Plaintext Plaintext
Plaintext
Cipher Block Chaining (CBC) mode decryption
Key Cryplography
b) Table: Symmetric versus Asymmetric
Symmetric key cryptography Asymmetric key cryptography
Characteristic used for encryption and
1. Key used for Same key is used for encryption One key
another, different key is used for
encryption/ |and decryption.
decryption.
decryption Slower.
|2. Speed of encryption/ Very fast.
decryption.
C&NS-29
POPULAR PUBLICATIONS
b)The various modes are ECB, CBC, CFB, OFB and CTR
which are cxplained below:
Electronic Codebook Book (ECB)
message is broken into independent
blocks which are encrypted.
each block is a value which is substituted, like a
codebook, hence name.
cach block is encoded independently the
of other blocks
Ci= DESKI(Pi)
uses: secure transmission
of single values
Advantages and Limitations of ECB
repetitions in message may show in ciphertext
if aligned with message block
particularly with data such graphics
ur with messages that
change very little, which become a
problem code-book analysis
weakness due to encrypted message
blocks being independent
main use is sending a few blocks data.
of
Ciplher Block Chaining (CBC)
message is broken into blocks
but these are linked together
in the encryption operation
C&NS-30
SRYPTQGRAPHY &
NETWORK SECURITY
cach previous ciplhcr blocks is chained
use Initial Vector with current plaintext block, hence namc
(|V) to start process
Ci= DESKI(P XOR Ci-1)
C-l = |V
uses: bulk data cncryption,
nuthentication
Advantnges and Limitations CBC
of
cach ciphertext block depends on
all message blocks
thus a clhange in the message atccts all
as the original block ciphcrtest blocks after the change as well
nced Initial Value (IV)known to
sender & receiver
however if IV is sent in the clcar. an attacker can
and change IV to compensate change bits of the first block,
hence cither IV must be a fixed value (as
in EFTPOS) or it must bc sent
cncrypted in ECB mode before rest message
at end of message, handle possible
of
last short block
by padding cither with known non-data valuc
(e.g. nulls)
or pad last block with count
c.g. [bl b2 b3 0 0 of pad size
00S]<-3 data bytes, then 5 bytes padtcount.
Ciplher FeedBack (CFB)
message is treated as a stream bits
of
added to the output of the block ciphcr
result is fecdback for ncxt stage (hence name)
standard allows any number of bit (1,8 or 64 or whatcver) to be fecd back
denoted CFB-1, CFB-8, CFB-64 etc
is most efficicnt to use all 64 bits (CFB-64)
Ci= Pi XOR DESKI(Ci-1)
C-l = |V
uses: strcam data encryption, authentication.
Advantages and Limitations of CFB
appropriate when data arrives in bits/bytes
Imost common stream mode
limitation is nccd to stallwhile do block encryption after every n-bits
note that he block cipher is uscd in encryption mode at both cnds
crrors propagate for several blocks after the error.
Ci Pi XOR Oi
C&NS-32
CRYPTOGRAPHY &
NETWORK SECURITY
Answer:
Consider the following table:
Letter Bit sequence Letter Bit sequence
A 00000 10000
B 00001 R 10001
C 00010 S 10010
D (0001| T 10011
00100 10100
00101 V 10101
G 00110 W 10110
H 00111 X 10111
01000 11000
01001 11001
K 01010 11010
01011 1
11011
M 01100 2 1]100
01101 3 11101
01110 4 11110
p 01111 11111
i)
A- 00000 R-10001 E- 00100
T- 10011 Z- 11001 Q- 10000
XOR
ii)
Y- 11000 F- 0010I R- 10001
A- 00000 R- 10001 X- 10111
XOR
in the location of
4. a) Explain link encryption and end to end encryption
[WBUT 20171
encryption devices.
Answer: as a system for secure transfer of
End-to-end encryption, sometimes abbreviated E2EE, is
at points, no matter how
information where data is encrypted and decrypted only the end
is a
many points it touches in the middle of its virtual jourmey. This type of encryption
encryption differs from end-to
great way to provide secure, private communication. Link
all traffic at every point,
cnd encryption mainly in the fact that it encrypts and decrypts
C&NS-33
POPULAR PUBLIGATIONS
not just at the end points. With this approach, al data is in an encrypted state while it
travcls on its communication path. However, when it reaches a router or another
intermediate device, it gets decrypted so that the intermediator knows which way to
send it next. In end-to-end encryption the encrypting deviccs are at the two end points
whereas in link encryption the encrypting devices are at every point.
i)
A- 00000 R-10001 E- 00100
T- 10011 Z- 11001 P- 011|1
XOR
ii)
Y- I1000 F-00101 R- 1000I
A-00000 R- 10001 X- 10111
XOR
Y- 11000 U- 10100 G-
00110
So the plain text will be YUG
C&NS-34
SRYPTOGRAPHY &NETWORK SECURITY
Elements of PKI
A typical PKI consists of hardware, software, policies and standards to manage the
creation, administration, distribution and revocation of keys and digital certificates.
Digital certificates are at the heart of PKIl as they affirm the identity of the certificate
subject and bind that identity to the public key containcd in the certificate.
A
typical PKI includes the following key elements:
A trusted party, called a certificate authority (CA), acts as the root of trust and
provides services that authenticate the identity of individuals, computers and
other entities
A
registration authority, often called a subordinate CA, certified by a root CA
to issue certificates for specific uses permitted by the root
A certificate database, which stores certificate rcquests and issues and revokes
certificates
A certificate storc, which resides on a local computer as a place to store issued
certificates and private keys
A
CA issues digital certificates to entities and individuals after verifying their identity. lt
signs these certificates using its private key; its public key is made available to all
interested parties in a self-signed CA certificate. CAs uses this trusted root certificate to
so they
create a "chain of trust" - many root certificates are embeddcd in Web browsers
have built-in trust of those CAs. Web servers, email clients, smartphones and many other
types of hardware and software also support PKI and contain trusted root certificates
from the major CAs.
information
Along yith an entity's or individual's public key, digital certificates contain
person or entity identified, the digital
about the algorithm used to create the signature, the
purpose of
signature of the CA that verified the subject data and issued the certificate, the
as well as a date range during
the public key encryption, signature and certificate signing,
which the certificate can be considered valid.
C&NS-35
POPULAR PUBLICAIIONS
In cryptography,
a one-time pad is that is then decrypted by the receiver using
is
a message
uscd only once to cncrypt cncrypted with keys based on randomness a
key. Messages
matching one-time pad and way to "brcak the code" by analyzing
is theoretically no a
have the advantagc that there no relation
messages. Each encryption is unique and bears to thhe next
succession of With a one-time pad, however,
pattern can be detected. the
encryption so that some message and thi
same key used to encrypt the
decrypting party must have access to the
party safely or how to keen
raises the problem of how to get the key to the decrypting
both keys secure. One-time pads have sometimes been used
when the both parties stared
out at the same physical location and then separated, each with knowledge of
the kevs in
a a secret key because if it is
the one-time pad. The key used in one-time pad is called
figured
revealed, the messages encrypted with it can casily be deciphered. One-time pads
War
prominently in secret message transmission and espionage before and during World
il and in the Cold War era. On the Internet, the difficulty of securely controlling secret
keys led to the invention of public key cryptography.
c) Cryptanalysis:
Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text.
Cryptanalysis uses mathematical formulas to search for algorithm vulnerabilities and
break into cryptography or information security systems.
[MODEL QUESTION]
Answer:
a) In cryptography, a one-time pad is asystem in which a private
key generated randomly
is used only once to encrypt a message
that is then decrypted by the receiver using a
matching one-time pad and key. Messages
encrypted with keys based on randomness
C&NS-36
CRYPTOGRAPHY& NETWORK SECURITY
have the advantage that there is theorctically no way to "break the code" by analyzng a
successtION of messages. Each cncrvption is uniaue and bears no relation to
the nCx
encryption so that some pattern can be detccted. With a one-timc pad, however, the
decrypting party must have access to the same key uscd to encrypt the message and tnis
raises the problem of how to get the key to the decrypting party safely or how to keep
both keys secure. Onc-timnc pads have sometimes bccn uscd when the both parties started
out at the same physical location and then separated, each with knowlcdge
of the keys i
the onc-timc pad. The key used in a onc-time pad is callcd a sccret key because if it is
revealed, the messages encrypted with it can casily be deciphered. Onc-timc pads figured
prominently in secret message transmission and cspionage before and during World War
Il and in the Cold War era. On the Internct, the difficulty
of securely controlling sccret
kevs led to the invcntion of public key cryplography.
N R T
Y E A R N
R M A T N T E
H L G D
|E P A R T M E N T
So the cipher text will be
ETOEDTNEMTRAPECRHNIAMASTUDRETYGOLONHMYTOFFOUNNOITAEARI
00100101
Encryption cxample 01010101 1001100
1
to encrypt. For
Now we nced somehing are the length of our knapsack, so: 010101 01
U0o
First we break it up into blocks that
110000 100101
sivtk
there are l's in the second, fourth and
If we look at the first block (010101), our publie
positions. This means that we take the second,
fourth and sixth numbers in
key, and add them together:
14+136+47 =197
This gives us the encrypted version of 01010101 11001100 00100101 as {197, 218, 41,
210}. This encrypted data would then be transmitted to the recipient.
We know that the subset-sum problem is easy to solve using a super-increasing set and
since our private key is super-increasing we can send them this along with m and n (as
chosen carlier), to enable them to decrypt the message.
Decryption
Decrypting the message is the same as solving the subset-sum problem with the original,
decrypted message as our target. First we need to solve:
(x * 27) mod 175 = 1 so that we can move from the hard non-super-increasing set to
the easy super-increasing set.
In this case, x = 13.
We can then do
(13 197) mod 175 =1|| to translate the target of the hard to solve problem to the target
of the easy to solve problem. If we look at the private key ( {, 7, 9, 18, 50, 86 } ), we
can easily see that 111 is, made up of 86 + 18 + 7. Since
these correspond to the second,
fourth and sixth values in the key, w can convert this to 010101. Repeating
this with the
other parts of the cncrypted data will reveal the whole message.
8. Describe steganography.
WBUT 2023]
Answer:
It is the process of hiding a message message.
in another
E.g., hide your plaintext in a graphic image
Each pixel has 3 bytes specifying the RGB color
The least significant bits of pixels can be changed
wlo greatly affecting the image
quality
C So can hide messages in these LSBs. Take a
640x480 (-30,7200) pixel image.
Using only 1 LSB, can hide 115,200 characters
C&NS-38
CRYPTOCaAPHY &NEIWORK SECURITY
C&NS-39
POPULAR PUBLICATIONS
using the Playfair Cipher: The Playfair Square, which forms the kev of.,
Encryption a
consists of a five-by-five grid, where cach entry contains unique let
Piayfair Cipher,
pre-processed the plaintextaccording to the outlin
of the alphabet other than J. Having as
procedure, the plaintext is encrypted follows:
same row of the Playfair Square then
1.
If two plaintext bigram lctters lic in the
on its right in the Playfair Square (if one of th
replace each letter by the letter
in the fires
letters lies in the fifth entry of the row then replace it by the letter
entry of the row).
2. Iftwo plaintext bigram letters lic in the same column of the Playfair Square then
replace cach letter by the letter bencath it in the Playfair Square (if
one of the
letters lies in the fiAth entry of the column then replace it by the letter in the first
entry of the column).
3. Otherwise:
a) Replace the first plaintext bigram letter by the letter in the Playfair Square
occurring in
the same row as the first bigram letter and
the same column as the second bigram letter.
b) Replace the second plaintext bigram letter by the letter in the Playfair Square
occurring in
the same column as the first bigram letter and
the same row as the second bigram letter.
Example of a Playfair Cipher: An example is very useful for mastering the subtleties of
the Playfair Cipher.
Fig. 1 shows an example of a Playfair Square. We use
this as the key to cncrypt the
plaintext NATTERJACK TOAD. Ignoring the space
process the plaintext in preparation for encryption, as between the two words, we pre
follows:
1. First, replace the single occurrence an
ofJ with I, resulting in NATTERIACKTOAD.
T A N
Z|I| D
R C H B
K
M P Q
W X Y
Fig: 1 Example of a Playfair Square
2. We write out the plaintext as a sequence
of pairs of letters:
NATT ER IA CK TO AD,
3. We observe that the second
bigram consists of TT, so we must insert a
the two Ts, to get Z in between
NATZ TE RI ACKT OAD,
C&NS-40
CRYPTOGRAPHY& NETWORK SECURITY
b) Gilbert Sandford Vernam (1890-1960) was said to have invented the stream cipher in
1917. Vermam worked for Bell Labs and his patent described a cipher in which a prepared
key, on a paper tape, combined with plaintext to produce a transmitted ciphertext
message. The same tape would then be used to decrypt the ciphertext. In effect, the
Vernam and "one-time pad" ciphers are very similar. The primary difference is that the
"one-time pad" cipher implements an XOR for the first time and dictates that a truly
random stream cipher be used for the encryption. The stream cipher had no such
requirement and used a different method of relay logic to combine a pscudo-random
stream of bits with the plaintext bits. More about the XOR process is discussed in the
section on XOR ciphering. In practice today, the Vernam cipher is any stream cipher in
which pseudo-random or random text is combined with plaintext to produce cipher text
that is the same length as the cipher. RC4 is a modern example of a Vernam cipher.
Example: Using the random cipher, a modulus shift instead of an XOR and plaintext to
produce ciphertext
Plaintext 1
th is wi l 1 besoeas
n n y
ytob rea k
i tw
i 11 b e fu
C&NS-41
POPULAR PUBLICATIONS
5 ]1
23 9 12 12 19 15
2 5 5 1 19 25 20 15 2
18 11 9 20
20 8 9 19
23 9 12 12 2 56 21 14 14 25
Cipher One
e
r tyu o p a s d £ g h j k 1 z x CV b n m q a z Wsy
q
i
fv t
6 7 8 10 11 12 26 24 3 22 2 14 ..
17 5 18 20 25 21 15 16 1 19 9 4
17 1 26 23 19 24 5 18 6 22 20
CipherText 1
11 13 1 13 22 4 21 1 18 6 12 19 11 8 1 9 5 1 2 16 8 23 13 23 7 14
10 12 9 21 3 11 13 20 10 19
k m a m
vdu a r f l s kh a i e a bph w m
wg n j l w uck
m
t j s
Plaintext 2
t h i s w
i 1 1 n
ot b e e a s yt o
br e a k o r bet oof u
n n y
20 8 9 19 23 9 12 12 14 15 20 2 5 5 1 19 25 20 15 2 18 5 1 11
15
18 2 5 20 15 15 6 21 14 14 25
u acy b i ce q m
t j s
h k m
C&NS-42
CRYPTOGRAPHY &
NETWORK SECURITY
ii)Vigenère cipher:
An early stream cipher is commonly ascribed to
the Frenchman Blaise de Vigenère, a
diplomat who served King Charles
X. works by adding a key repcatedly into the
plaintext using the convention that A =0,
It
B=
modulo 26-that is, if the result is greater than 1,....Z-
25: and addition is carried out
Steps:
Use a 5 x S matrix.
Fill in letters of the key (w/o duplicates).
Fill the rest of matrix with other letters.
E.g., key= MONARCHY.
M N A R
H B
F G K
L P
W
U
C&NS-43
POPULAR PUBLICATIONS
iv) Steganography:
Refer to Questions No. 8 of L.ong Answer Type Questions.
C&NS-44
CRYPTOGRAPHY& NETWORK SECURITY
6. Which one of
the following modes of operation in DES is used for operating
short data? WBUT 2023]
Answer: Electronic Code Book (ECB)
7. Bits contain in DES encrypts blocks. [MODEL QUESTION]
a) 32 b) 56 c) 64 d) 128
Answer: (c)
8. In DES encryption algorithm, which of the following is used for converting 32-bit
right half into 48-bits? (MODEL QUESTION]
a) Permutation b) Expansion permutation
c) Substitution d) Key scheduling
Answer: (a)
C&NS-45
POPULAR PUBLICATIONS
Answer:
An initialization vector (IV) is
an arbitrary number that can be used along with
a nonce, is employed
a secte,
key for data encryption. This nunber, also called only onetime in
any session.
The use of an IV prevents repetition in data encryption, making it more difficult for
a
hacker using a dictionary attack to find paterns and break cipher. For example,
a
a
sequence might appear twice or more within the body of a message. If there arc repcated
Scqucnces in encrypted data, an altacker could assume that the corresponding sequences
in the message were also identical. The 1V prevents the appearance of corresponding
duplicate character scquences in the cipher text.
The ideal IV is a random number that is made khown to the destination computer to
facilitate decryption of the data when it is received. The IV can be agreed on in advance
transmitted independently or included as part of the session setup prior to exchange of the
message data. The length of the 1V
(he number of bits or bytes it contains) depends on
the method of encryption. The IV length is usually comparable to the length of the
encryption key or block of the cipher in use.
C&NS-46
CRYPTQGRAPHY& NETWORK SECURITY
58 42 34 26 18 10 02
S9 S1 43 35 27 19 11 03
60 52 44 36 63 55 47 39
31 23 15 07 62 54 46 38
30 22 14 06 61 53 45 37
29 21 13 05 28 20 12 04
iC&NS-47
POPULAR PUBLICATIONS
64 bits
Party bt drop
Cipher key (56 bits)
28 bits 28 bits
28 brts 28 bits
Compression
P-box
Generator
48 bts
Shift left Shift left
28 bits 28 bits
Compresion
P.box
48 bits
C&NS-48
CRYVTOGRAPHY& NETWORK SECURITY
Espantinomutaioa Le shifu)
(EtNc
XOR) emutationkostea
2)
(Amutod chicc
Substitution/choice
(S-box)
Permutation
(P)
(NOR
bits represcnt
rows) and the inner four the columns
represents the row (one of the four row and the column meets represents
The cell where the
(one of the 16 columns). as
converted to binary the output. From
the
in decimal of the output. This is then
value the
digits 00 the row which is the first row (00, 01,
=
2 Part: SGIITOWEUROHGENNSFNYBLEYCOTAVTEL
2. Decrypt C with all possible values of K2, check cach resulted value with the
entries in the table, in case of match, check these two keys against another known
pair (Pi,CI), ifmatch, accept them as the correct keys.
b)
1. Il's a decryption process in order to change the traditional nature of
the DES, if it's an
encryption, it"llstay a DES but with longer key size.
2. In the cryptography, there is no significance of using the decryption in the middle
stage, the only advantage of doing so is to allow users of 3DES to decrypt data
encrypted by the users of the older single DES
C= Ekl[Dk2(Ekl[P)] = Ek1[P).
Suppose that the middle portion isdecryption instead of encryption,
C= Eki (Ek2{Ekl[P)))
The previous assumption in equation I will not be ever met. On the other hand
C&NS-50
CRYTOGRAPHY &
NETWORK SECURITY
11. What are the different types of symmetric key encryption? (MODEL QUESTION]
Answer:
Types of symmetric key ciphers are
Block Ciphers: Symmetric key ciphers, where a block of data is encrypted
Stream Ciphers: Symmetric key ciphers, wherce block size=l
12. What are the modes of operation of Biock cipher? [MODEL QUESTION]
Answer:
Block ciphers can operate in several modes like Electronic Codebook (ECB), Cipher
Block Chaining (CBC), Cipher Feedback (CFB) mode and (Output Feedback (OFB) etc.
(MODEL QUESTION]
13.What is the key size of IDEA?
Answer: a
IDEA operates with 64-bit plaintext and cipher text blocks and is controlled by 128-bit
key and there are 8 rounds of transformation.
[MODEL QUESTION]
14. How the keys are generated In IDEA?
Answer:
transformed into 16 bit subkey for rounds. 64-bit plaintext block is
8
128 bit key is
on 16 bit sub-blocks in 8
partitioned into four 16-bit sub-blocks. Then keys are operated
are generated from the 128-bit
rounds subsequently. The 52 16-bit key sub-blocks which
key are produced as follows:
C&NS-51
PUBL,ICATIONS
POPULAR
Answer: A
Electronic Code Book (ECB) mode: block cipher encrypls and decrypts plaintext
in
fixcd-size-bit blocks (mostly 64 and 128 bit). For plaintext exceeding this fixed size, the
blocks offequal length: and encrypt
simplest approach is to partition the plaintext into cach
Code
separately. This method is named Electronic Book (ECB) mode. However,
Electronic Code Book is not a good system to use with small lock sizes (for examoe
smaller than 40 bits) and identical encryption modes. As ECB has disadvantages in mos
applications, other methods named modes have been created.
In cipher block chaining, or CBC, mode we esclusive-or the previous block of cipher text
to the current block of plaintext bcfore cncryption. This mode is cfective at disguising
any patterns in the plaintext: the encryption of cach block depends on all the previous
blocks. The input IV is an initialization vector, a random number that performs the sane
function as a seed in a stream cipher, and ensures that sterceotyped plaintext message
headers won't leak infomation by encrypting to identical cipher text blocks. Othes
modes include, Cipher Feedback (CFB) and Output Feedback (OFB) modes.
C&NS-52
CRYITOGRAPHY&NETWORK SECURITY
C&NS-53
POPULARPUBLICATIONS
Description of IDEA
and cipher text blocks
The block cipher IDEA operatcs with 64-bit plaintcxt
in the design offthis and
controlled by a 128-bit key. The fundamental innovation algorithmis
groups. The substitution boxes is
the use of operations from threc different algebraic and
the associatcd table lookups used in the block ciphers available to-date have been
completely avoided. The algorithm structure has been chosen such that, with the
exception that diffierent key sub-blocks are used, the encryption process is identical to th
decryption process.
Key Generation
The 64-bit plaintext block is partitioned into four 16-bit sub-blocks, since all the
algebraic operations used in the encryption process operate on 16-bit numbers. Another
process produces for cach of the encryption rounds, six l6-bit key sub-blocks from the
128-bit key. Since a further four 16-bit key-sub-blocks are required for the subscquent
output transformation, a total of 52 (= 8 x6+4) different 16-bit sub-blocks have iobe
generated from the 128-bit key.
The key sub-blocks used for the encryption and the decryption in the individual rounds
are shown in Table 1.
Encryption of the key sub-blocks
Round I Z"Z"z,"Z"Z,"Z,"T
Round 2
Round 3 Z"ZZ,z,"Z,"Z"
Round 4
Round 5 zz,"Z,Z.ZZ,)
Round 6 z0z,02,OZ,DZZ,a
Round 7 Z"Z"2"ZZ"Z,"
Round 8 ZZ,"Z"Z"Z,"Z
Output
Transform z,"z,z,"z,9)
The 52 16-bit key sub-blocks which are generatcd from the 128-bit key are
produced as
follows:
First, the 128-bit kcy is partitioned into eight 16-bit sub-blocks which are then
directly used as the first eight key sub-blocks.
The 128-bit key is then cyclically shifted to the left by 25 positions, after which
the resulting 128-bit block is again partitioned into eight 16-bit sub-blocks to be
directly used as the next eight key sub-blocks.
The cyclic shift procedure described above is repeated until all the required 52
of
16-bit key sub-blocks have been generáted.
C&NS-54
CRYTOGRAPHY &NETWORK SECURITY
Encryption
The functional representation of the cncryption process is shown in Figure 1. The process
consists of cight identical cncryption steps (knowyn as encryption rounds) followed by an
output transformation. The structure of the first round is shown in detail.
Plainnext 4 16 bit
Z,"
First
Round
-Z,""
7 additional rounds
Output
2, Z," Transform
gh Round
Ciphertext 4 16 bit
In the first encryption round, the first four 16-bit key sub-blocks are combined with two
of the 16-bit plaintext blocks using addition modulo 2, and with the other two plaintext
blocks using multiplication modulo 2 + 1. The results are then processed further as
shown in Figure 1, whereby two more 16-bit key sub-blocks enter the calculation and the
third algebraic group operator, the bit-by-bit exclusive OR, is used. At the end of the first
encryption round four 16-bit values are produced which are used as input to the second
encryption round in a partially changed order. The process described above for round one
is repeated in each of the subsequent 7 encryption rounds using different 16-bit key sub
blocks for each combination. During the subsequent output transformation, the four 16
bit values produced at the endof the 8th encryption round are combined with the last four
C&NS-55
POPULAR PUBLICATIONS
multiplication modulo
of the 52 key sub-blocks using addition modulo 2° and
form the resulting four 16-bit ciphertext blocks.
Decryption
Decryption of the key sub-blocks
Round I
ZV-Z,-Z"Z,z,Z,
Round 2 Z-Z,5-Z,"Z(5Z."Z)
Round 3 zVF-2-Z"ZZ"Z
-Z,"-Z,°ZOZ.Z1
Round 4 Z
Round 5 Z-Z,1-ZZ,'Z,"z
Round 6 Zu-Z,"-z,"Z,"Z,Z
Round 7 ZU-Z4-Z,Z,(ZZ
Round 8
Output Z,"M.
Transform '-z,'"-z,"Z,1
The computational proccss used for decryption of the ciphertext is essentially the same as
that used for encryption of the plaintext. The only difference compared
with encryption is
that during decryption, different l6-bit key sub-blocks are
generated.
Morc prcciscly, cach of the 52 16-bit key sub-blocks used
for decryption is the inverse of
the key sub-block used during encryption in respect
of the applied algebraic group
operation. Additionally, the key sub-blocks must
be used in the reverse order during
decryption in order to revcrse the encryption process as
shown in Table 2.
Modes of opcration
IDEA supports allmodes of operation as
described by NIST in its publication FIPS 81l. A
block cipher encrypts and decrypts plaintext
in fixed-size-bit blocks (mostly 64
bit). For plaintext excecding and 128
this fixed size, the simplest approach
plaintext into blocks of cqual length is to partition the
and encrypt each separately. This
Electronic Code Book (ECB) mode. method is named
However, Electronic Code Book
system to use with small block is not a good
sizes (for example, smaller than 40
cncryption modes. AsECB has disadvantages bits) and identical
in most applications, other
modes have been created. They are methods named
Cipher Block Chaining (CBC),
(CFB) and Output Feedback (OFB) modes. Cipher Feedback
2. What is {01)" in
GF(2)? Verify the entry for (01) in
Answer: the S-box. [WBUT 2018]
The Sub Bytes transformation is a
nonlinear byte substitution
oneach byte
oftheState usinga substitution that operates independently
table (S-box). ThisS-box, was
usually invertible, and it can
1. Look up
table construted using two method :
2. Composite field arithmetic
C&NS-56
CRYPTOGRAPHY& NETWORK SECURITY
In that loOk up table all the valucs arc prede fined based on the ROM so the arca and
memory access & latency is high. So our method is based on the composite field
arithmetic it contain two main opcration as follows:
(1)Perform the multiplicativc inverse in GF(2^8).
(2) Perform the afine transformation over GF(2).
The GF stands for Galois Ficld. The Arithmetic in a finite ficld( Galois Field) is usually
difierent from the standard integer arithmetic.
The finite ficld should contain the limited nunbcr of clements. The finite field with (p^n)
element is denotcd GF(p^n), where p is a prime
Number called the characteristic of the ficld and n is a positive integer. A particular case
is GF(2)which has only two clemcnts (1 and 0)where addition is exclusive OR (XOR)
and multiplication is AND. The element "0" is never invertible, the element "1" is always
invertible and inverse to itsclf. Therefore, the only invertible element in GF(2) is "1".
Since the only invertible clement is "1" and the
multiplicative inverse of "]" is also "!", division is an identity function. This proves the
entry of {O1} in S-box.
ii) Encryption
The functional representation of the encryption- process is given below. The process
consists of eight identical encryption steps (known as encryption rounds) followed by an
output transformation. The structure of the first round is shown in detail.
In the first encryption round, the first four 16-bit key sub-blocks are combined with two
of the 16-bit plaintext blocks using addition modulo 2°, and with the other two plaintext
blocks using multiplication modulo 2 + 1. The results are then processed by two more
I6-bit key sub-blocks enter the calculation and the third algcbraic group operator, the bit
by-bit exclusive OR, is used. At the end of the first encryption round four 16-bit values
are produced which are used as input to the second encryption round in a partially
C&NS-57
PQPULAR PUBLICATIQNS
Decryption
Thecomputational process used for dccryption of the ciphertext is essentially the same as
that used for cneryption of the plaintext. The only difference compared with encryption is
that during decryption, different 16-bit key sub-blocks are generated.
More precisely, each of the 52 16-bit key sub-blocks used for decryption is the inverse of
the key sub-block used during encryption in respect of the applied algebraic group
operation. Additionally, the key sub-blocks must be used in the reverse order during
decryption in order to revcrse the cncryption process.
C&NS-S8
CRYVTOGRAPHY &
NETWORK SECURITY
64-bit plaintext
56-bit plaintext
Initial ermutation 1
Permuted choice
32 bits 32 bits S6 bits
Round I Jas hit Permuted Choice2 Lefn Circular Shift
32 bits | 32 bits S6 bits
Round 2 Permuted Choice 2 Len Circular Shift
48 bits J56 bits
64-bit ciphertext
C&NS-59
POPULAR PUBLICATIONS
2. RSA .......
be used for digital signatures. WBUT 2014, 2015, 20191
a) Must not b) Cannot c) Can d) Should not
Answer: (c)
6. We require
to verify digital signature.
a) receiver's public WBUT 2019]
key b) sender's private key
c) receiver's private
key d) sender's public key
Answer: (b)
7.
is used to generate a message
protocols. digest by the network security
Answer: SHA Iand MDS
[WBUT 2023]
C&NS-60
CRYTOGRAPHY& NEJWORK SECURITY
2^1 mod 1] =2
2^2 mod 1| =4
2^3 mod 1| =8
2^4 mod 1| =5
2^5 mod 1| = 10
2^6 mod 1| =9
Therefore Xa =6
C&NS-61
POPULAR PUBLICATIONS
Answer:
Difie-Helman Algorithm and is still considered
was the first public-key algorithm
The Diffic-Hellman algorithm a
uscs public-key cryptography to negotiate security parameters
onc of thc best. IKE t
Spccially, the DifMie-Hellman algorithm is uscd in the
protcct key exchanges.
agree on a shared secret by generating
the key
pcers for
negotiations to enable the two to algorithm is used several time
use. This is why you sce that the
will Diffic-Hellman
throughout the proccss. peer contains a private key. The Diff
In general, here is how the algorithn works: Each a public key is a
Hellman algorithn takes that private key and generales public key. The
product of the private key, but is such that the private key
cannot be deduced by knowing
as shown in the figure below:
the public key. The peers then exchange public keys,
Peer A
Peer B
Key and
RI Private Key and RIPrivate
Public Key Public Key
L.
Public keys are cxchanged in
clear text
Shared secret
Fig: Diffic-Hellman Key Exchange
4. What are the propertles that a digltal signature should have? [wBUT 2016]
Answer:
To summarize, digital signatures have the following properties:
The signature can only be created by someone who knows the secret information.
Once a signature is created, anyone can validate that the signature is
associated
with the individual and the document, without
needing to know the secret
information used to create the digital signature.
Since the signature depends on the document, it cannot
be used to validate a
different document.
It is impossible to produce a document
that differs from the original document by
even asingle bit but for
which the signature is stillvalid.
In this way, the digital signature
replicates the desirable features
signature, and offers even stronger forms of a handwritten
followed in the handling secret information.
of authentication if the proper procedures are
of For example, handwritten signatures can
C&NS-62
CRYTOGRAPHY& NETWORK SECURITY
be verified only by cxperts practicing what can only be described as an incexact science.
By contrast, the mathematical procedure for verifying digital
signatures can be veritiea
by any number of independent agents, and there is no room for disagreement among
these agents. The numberS arc cither corrcct or they arc not.
6. Explaln RSA public key encryption algorithm with example. [WBUT 2017]
Answer:
Refer to l" part of Question No. I(a) of Long Answer Type Questions.
What do you mean by key management?
7.
WBUT 2017]
Answer:
Refers to the distribution of cryptographic keys
mechanisms used to bind an identity to a key
generation and maintenance of keys
revoking of keys
8. What do you use digital signature? What are digitalcertificates? WBUT 2018]
Answer:
1" part:
A digital signature is a mathematical techniquc used to validate the authenticity and
integrity of a message, software or digital document. The digital equivalent of a
handwritten signature or stamped seal, a digital signature offers far more inherent
security, and it is intended to solve the problem of tampering and impersonation in digital
communications. Digital signatures can provide the added assurances of evidence of
origin, identity and status of an electronic document, transaction or message and can
acknowledge informed consent by the signer.
20d Part:
A digital certificate, also known as a public key certificate, is used to çryptographically
link ownerstip of a public key with the entity that owns it. Digital certificates are for
sharing public keys to be used for encryption and authentication. Digital certificates
inclde the public key being certified, identifying information about the entity that owns
the public key, metadata relating to the digital certificate and a digital signature of the
public key created by the issuer of the certificate.
C&NS-63
POPULARPUBLICATIONS
2nd Part: Refer to Question No. 2(b) (2" part) of Long Answer Type Questions.
10. Explain the working principle of Message Digest and Hash function.
[WBUT 2019]
Answer:
1" part: Refer to Question No. 7(b) of
Long Answer Type Questions.
2 part: Refer to Question No. 5 of Long Answer Type
Questions.
11. Explain the concepts of Confusion
and Diffusion? [WBUT 2019]
Answer:
Refer to Question No. 4(b) of Long Answer Type Questions.
12. Briefly discussed Diffusion & Confusion.
Answer: WBUT 2023]
Refer to Questions No. 4(b) ofLong
Answer Type Questions.
13. How should one
check that the data is untampered,
error-free, unread?
Answer: [MODEL QUESTIONJ
i) untampered - Hash Functions
ii) error-free - Checksums
iii) unread -Quantum
tracing
14. What are the
generic algorithms involved
in public key cryptography?
[MODEL QUESTION]
C&NS-64
CRYPTOGRAPHY &
NETWORK SECURITY
Answer:
The randomized key generation
algorithm K (takcs no inputs
sk) of kcys, the public key and) returns a pair (pk,
and matching sccret key, respectively.
-K for the operation of executing K and letting (pk, sk) be the pairWe keys
write (pk, SK)
The encryption algorithm E takes thc of returned.
public key pk and a plaintext (also
message) M to return a valuc called called a
the ciphcrtcxt. We write C
-E(pk,M) for thc opcration of running E on inputs pk, M -E(M) or C
ciphertext returned. and letting C be the
The deterministic decryption algorithm D
takes the secret key sk and a ciphertext
to return a message M. We write C
M-D,(C) or M D(sk,C).
15. What are the characteristics of public
key encryption? [MODEL QUESTION]
Answer:
Public Key Cryptography - One of the keys would be publicly known
whereas the
other would be private
Must be computationally easy to encipher or decipher a message
given the
appropriate key
Must be computationally infeasible to derive the private key from the public key
Must be computationally infeasible to determine the private key from a chosen
plaintext attack
16. Give two examples of public key encryption algorithm. [MODEL QUESTIONJ
Answer:
Diffie-Hellman and RSA are two popular public key cryptography algorithm.
Diffie-Hellman
A pair of users generate a common key.
To,find k such that =g'modp for given n, g and prime p
also known as Symmetric key exchange protocol
-
RSA exponentiation cipher
Two large prime numbers p and q to be chosen and n=pq computcd
totient f(n)computed
chose an integer e <n and relatively prime to f(n).
find dsuch that ed mod f(n) = 1
C&NS-65
POPULAR PUBLICATIONS
18. What are the modes of operation public key encryption? [MODEL QUESTION)
Answer:
Public-key encryption functions operate on fixed-size inputs and produce fixed-size
outputs.
19. What do you mean by Symmetric & Asymmetric key Cryptography together or
hybrid encryption? [MODEL QUESTION)
Answer:
To get the speed of symmetric key opcrations in open systems, key exchange protocols
have been developed that initially use public-key operations to establish a shared key for
a given communication session and then use
that shared key (under, e.g., AES) for the
remainder of the session. A simplistic example involves encrypting a
large amount of
data x. Given a secure public-key encryption scheme (E, D) with public
key K for
principal j, principal i can generate a new shared key k for AES and send AESK(X)
Ex(k). Then jcan decrypt k and use k to decrypt x at high speed. Key k can then ||
for a session of communication between iandj. be used
20. What are the security mechanisms attempted for detection of corrupted
documents and messages and protection against unauthorized modification?
[MODEL QUESTION]
Answer:
Detection of corrupted documents and messages
Detection of bit errors caused by unreliable
transmission links or faulty storage
media.
Solution: Message Digest acting as a unique fingerprint
for the document (similar
function as CRC).
C&NS-66
CRYITOGRAPHY& NETWORK SECURITY
21. What do you mean by data integrity? What are the algorithms involveJ in
ensuring data integrity? (MODEL QUESTIONJ
Answcr:
Data integrity involves checking that the rccejved message is without data corruption like
altering and tampering of the documents. Use of message digest and digital signature
ensurcs data integrily.
C&NS-68
CRYPTOGRAPHY& NETWORK SECURITY
Having caleulated the meSsage digest this can be encrypted using the
private key o
he
originator to produce the digital signature, as shown in the diagram below:
SIIA-1 EPT9W8nb2z7byME.pnwHrUSkXig*
Digtal Signature.
VrCooaN1fp Rcoeujjczg
VjBluUUOg+ VwgGCFoodB
gZ0"
Lqph2d'qDd
EPT9W&mb2z7byMqEpnwHTUSKXIg=
EPT9w&mb227by MqEpnwHTUSkXlg= Match?
signature
Fig: Verifying a digital
C&NS-69
POPULARPUBLICATIONS
C&NS-70
CRYITOGRAPHY & NETWORK SECURITY
2nd Part:
The steps are:
1. Each system generates a pair of keys.
2. Each system publishes its encryption key (public key) keeping its companion key
private.
3. IfA wishes to send a message to B it encrypts the message using B's public key.
4. When B receives. the message, it decrypts the message using its private key. No one
else can decrypt the message because only B knows its private key.
C&NS-71
POPULAR PUBLICATIONS
Bobs's
public
key rng
Joy ,Ted
Mike Alice
Alicc's
Alice's private key
publc key
Transmtted
ciphertest
Joy
Mike Bob
Bob's
Bob's
private key
public key
Transmitted
ciphertext
Plantext Plaintext
Encryption Algorithm Decryption Algorithm
nput (c.g. RSA) reverse of encryption output
(b) Authentication algorithm
Considering P-K in more detail we have a source A that produces plaintext X destined for
B. B generates a pair of keys KUb (a public key) and KRb (a private key). With X and
KUb as inputs, A forms the ciphertext Y:
Y = Exu(X)
The intended receiver B is able to invert the transformation with his private key:
X=DxRb(Y).
C&NS-72
CRYTOGRAPHY& NETWORK SECURITY
Cryptanalyst
A
KRA
Sourcc A
Destination B
KR
KU,
Key Pair
Source
b) Advantages of SSL:
SSL also has numerous interesting noteworthy aspects, as
Completely universal - the following list highlights:
SSL's all-purpose applicability instantly creates a VPN
client using any modern Web browser (older
versions may not suppor SSL, so
be sure to test older browsers that may
be employed in your user population,
knowing that VPN requirements may force upgrades to
occur)
Total flexibility SSL supports additional applications without firewall
configuration changes.
Total transparency SSL background services have no visible impact on end
users.
Cost effectiveness Existing SSL implementations conserve both time and
budget.
Unrestricted movement
pass through most firewalls.
-
Many SSL VPNs use that SHTTP port, allowed
C&NS-74
CRYPTOGRAPHY & NETWORK SECURITY
TLS SSL
More sccure in Comparisonto SSL. Less secure in cormparison to TLS.
TLS 1.0 and 1.1 are cumently deprccatedAIL the SSL versions are deprccated now.
but TLS 1.2and TLS 1.3 are actively uscd
asof 2022.
Pruvides more alert messages than SSL. Less alcrt messages in comparison to
TLS.
Provides support to the alern messagcs No support provided for the alert
generated by SSL..
messages.
Uses HMAC for data integrity. TLS 1.3 Uses MDS and SHAI based on a MAC.
uses AEAD for both encryption and
authentication.
Doesn't support the Fortezza cipher suite. | Supports the Fortezza cipher suite.
Client sends an insecure Hello requcst and An explicit secure conncction is made at a
once secure connection is made port. For example cxplicit HTTPS
communication switches to a port like 443 connection is made at port 443.
in case of HTTPS.
We also can verify the corectnessby the RSA cncryption algorithm as the following:
CT = PTe mod n=55 mod 35 = 10
Therefore, we conclude that the plaintext PT is 5.
Therefore
=
D(3599) (61) o(59) = 60* 58 =3480
Step 3: Calculate d
We know that if gcd(O(n), e)= 1,then e has a multiplicative inverse modulo o(n)
Therefore
d=e'modo(n)
i.e. d is multiplicative inverseofe mod (n)
C&NS-77
POPULAR PUBLICATIONS
-112 8
3 -112 8 -3 337
-3 337 7 4 449
Now we need to check whether 449 is multiplicative inverse of 3 l modulo 3480
Therefore
449 * 3| =-13919
-13919 mod 3480=-3479 mod 3480 =| mod 3480
Hence it is proved that d =449 is multiplicative inverse of e= 31 mod
o(n)
So the private key of this user will be {-449, 3599}
MDS computes a haslh value of 128 bils (16 bytcs) out of an arbitrary-sized binary
document.
-
SHA Secure Hash Algorithm
Developed by the US National Institute of Standards and Technology (NIsT) with
the assistance of thc National Sccurity Agency (NSA).
SHA-1 computes a hash value of 160 bits (20 bytes) out of an arbitrary-sized binary
document. The algorithm is similar to MDS.
SHA-1 is more secure than MDS due toits increased hash size.
An improved SHA-2 algorithm with hash sizes of 256 bits (32 bytes), 384 bits (48
bytes) and 512 bits (64 bytes) was published by NIST in October 2000 1o keep up
with the increased key sizes of the Advanccd Encryption Standard (AES).
C&NS-79
POPULAR PUBLICATIONS
C&NS-80
CRYTOGRAPHY &
NETWORK SECURITY
C&NS-81
POPULAR PUBLICATIONS
I0003
Client PC with
IE Web Browscr
TCP Port 1025 |000|
Roquests nformation 208.73.11866
from the Web Server
on the internet
Modem
I57 54.01 Web Server
TCP Pot 80
NAT-cnabled Router
TCP Port |9.44
Optional NAT
Components Configured:
• Basic Firewall
DHCP Ailocator
DNS Proxy
The following table describes cach component shown in the prcceding figure.
Component Description
on its network adapter.
Client PCs Each client has private IPv4 address configured
a
C&NS-82
CRYTOGRAPHY &
NETWORK SECURITY
addresses as the lPScc peers. Though it could also be cncapsulated in tunnel .ode
likecverything clsc but here is an interesting concept.
Transport mode having Larger MTUthanTunncl mode
Transport mode Requires IPsec to be implemented on the IPS entities Wnerca
Tunncl mode Don't have to implement IPscc on the IPS entity
Traversing NATs is gasicr in tunnel mode than transport mode
6. a) Why is the SSL layer positioned between the application layer and transport
layer? [wBUT 2015, 2016, 2019]
b) What are the problems associated with clear text password?
WBUT 2015, 2018, 2019]
Answer:
a) Because of its position, SSL gives the client machines the ability to selectively apply
security protection on individual applications, rather than set forth encryption on an entire
group of applications. The procedure can be done without concerning Layer 3, the
network layer. For these reasons, when SSL is used for encrypting network traffic, only
the application layer data is actually encrypted. This differs from, say, the IPsec protocol,
which operates at the network layer and encrypts all traffic data right down to the IP
layer.
C&NS-84
CRYPTOGRAPHY& NETWORK SECURITY
Answcr:
Passwords have the fundanmental
problem that they are reusablc. If an attacker sees a
nassword. she can later replay the password. The system cannot
distinguish betwecn ne
attacker and the legitimate user, and allows access. An
alternative is to authenticate m
such a vay that the transnnitted password changes cach time. Then, an attacker
a if replays
previously uscd password, the system will rcjcct it. Let user desire to
U
authenticate
himselt t0 system S. Let and S have an agrecd-on secrct function f. A challenge
U
validates
rby computing it scparately.
12. What is the common way to ensure authentication? (MODEL QUESTIONJ
Answer:
Passwords are an examplc of an authentication mechanism based on what people know:
the user supplies a passwvord, and the computer validates it. If the password is the one
associated with the user, that users identity is authenticated. If not, the password
is
rejected and the authentication fails.
personal identification number (PIN) and then provide an iris scan to complete
authentication process. Differcnt mechanisms by which biometric can be includedthe
cryptography: in
Fingerprints
May be scanned optically
A
capacitative technique uscs the differences in electrical charges
of
on the finger. The data is converted into a graph. The problem of the whors
determining
matches is basically similar to the classical graph isomorphism.
Voiccs
Authentication by voice involves recognition
or verbal information verification.
of a spcaker's voice characterist
The first one uses statistical techniques to A
the hypothesis that the speaker's identity is as
claimed. The other one deals m
C&NS-86
CRYPTQGRAPHY&NETWORK SECURITY
The first layer is the physical layer from the NSM and the physical layer fron the OSi
model. Both work with the physical aspects of the network. The physical layer from the
NSM deals with physical securities where thc physical layer from OSI
dcals
physical network conncetions. Both layers are very scif explanatory and very easy to deal
with.
The second layer is the VLAN layer from the NSM and the data link layer from the OSi
model. Both work sinilarly by dealing with MAC addressing and VLANs. The VLAN
layer fromthe NSM deals with VLAN seginentation. This splits LAN'S across switches
and segments based on the data link layer from OSI model which covers MAC
addressing.
The third layer is the ACL layer from the NSM and the network layer frorn the OSI
model. Both work similarly by dealing with IP addressing and LAN's. The ACL layer
fronm the NSM dcals with ACL implementation which is used to allow or deny access
based on the network layer from the OSI model which covers IP addressing.
The fourth laycr is the software layer from the NSM and the transport layer from the OSt
model. Both deal with the actual connection on the network from host to host. The
software layer from the NSM deals with the software and the patches that allow the
OSI model describes the
software to not be exploited whilc the transport layer from the
connection between the both ends of the software connection.
OSI model.
The fifth layer is the user layer from the NSM and the session layer from the
Both deal directly with the local host wherc the
user layer from the NSM deals directly
layer from the OSI
with the user who is able to utilize that local machinc. The Session
model deals directly with communication on that local machine.
presentation layer from
The sixth layer is the administrative layer from the NSM and the
administrative layer deals
the OSI model. Both deal with administrative functions. The uscrs
to direct and the presentation
with the administrative users who have the ability
layer deals with how the data is
dirccted.
The seventh and final layer is the IT department
layer from the NSM and the application
layer deals directly with the maintenance
layer from the OSImodel. The IT department model
sure that the entire network works correctly from NSM
of all layers and making application layer from the OSI model deals with the.
and all layers of the OSI model. The
actual display of the data.
creation ofa Digital certificate. How is SHTTP
3. a) Name the four key steps in the [WBUT 2016, 2019]
different from SSL? WBUT 2017]
b) What is HMAC?
Answer:
a) 1" Part: the IP-Protcctor application. Then, a copy of the
Digital certificate is creatcd outside of
private key is exported for access by IP-Protector sofware.
certificate and
Steps:
1. Creating our private
signing key and certificate
Vendors that provide CA services
C&NS-87
POPULAR PUBLICATIONS
access by IP-Protector
2. Exporting your certificatc for
3. Recording key storage
location information in IP-Protector
a
4. Accessing the private key to crcate signature
C&NS-89
POPULAR PUBLICATIONS
must
SSL to
has encrypt all the headers, it be I positioned
obvious: if below
This is quite
serve no purpose at all. In fact, would leadto problemg
it
SSL. laycr
Transport laycr
Network layet
Physcal layer
Eyes: Iris -The iris is the coloured circular segment at the front of theeye that contains
the pupil at its centre. The iris controls the size of the pupil to adjust the afnount of light
entering the eye. Iris recognition technology uses the unique patterns of the coloured
tissue that form the iris. Thcse patterns are captured by a camera operating in near infra
red wavelengths. The first iris cameras had to be close to the eyes (but not in contact with
them) in order to record sufficient detail but technological advances now allow cameras
to be placed several feet away and capturc the irises of those on the move such as at an
airport boarding gate. The system uses pattern-recognition algorithms, in a similar way to
automated fingerprint recognition systems, to perform comparisons in both the
biometric one-to-one (1:1) verification to authenticate a suggested identity and one-t
many (1:N) identification'modes as a probe to search a database to establish if any of
the other iris records provide a potential match.
Eye: Retina The retina lies at the back of the eye and detects light which is
transmitted as electrical impulses to theoptic nerve. The retina is fed by a network of
blood vessels and it is this network that forms the unique structure that facilitates retina
recognition. The array of blood vessels is different in each cye and no two people have
the same configuration.
Face - Face biometrics use aspects of the facial area to verify or identify an individual.
There are a wide variety of techniques used to statistically look at facial characteristics in
a way that is not affected significantly by age, expression, lighting, or many other
variables. Such techniques might include machine learning algorithms, such as
convolutional neural networks (CNN) that have been trained on huge sets of facial
images. It does not directly involve mcasuring the distance between fëatures. Current face
algorithms describe the shape and appearance of facial features, like cyes, nose or mouth,
C&NS-91
POPULAR PUBLICATIONS
capture discriminative
by applying imagc proccssing spccially traincd to as a
andstable
representation which is known face template.
a
combincd in numeric a face' dan
about
The same techniques can also be tused to derive information
the
s
charactcrisicy
identificaion
uses do not necd to involve
such aS age or gender. Such
individual. of an
a conventional camera
or
Fingerprint -- Fingerprints are formed by the raised papillary ridges that run across
skin's surtace. Humans, together with some other mammals, have these ridges on the
their.
fingers, thumbs, palms and the toes and soles of the fet. The ridges have evolved
to
provide friction in order to aid grip and locomotion. The flow of these ridges often forms
patterns but the ridges themselves do not always run continuously due to breaks
deviations in their structure (i.e., wherethe ridges end or bifurcate - known as minutiae).
The occurrence of these minutiae is random in nature and are used as the basis t
establishing identity as no two regions of skin, bearing papillary ridge systems, have eer
been found to have the same arrangement of minutiae. Consequently, thc fingerprints on
cach human digit are unique and can be used to identily individuals. The same is true of
palmprints but the area of ridged skin is much larger and therefore contains more delail.
Some biometric systenms use palm prints or palm prints together with fingerprints to enrol
individuals.
Biometric recognition systerms capture and digitise salient features from the fingerin
such as the arrangement of minutiae and the flow and orientation of the ridges to crcale
a biometric template. These templates are thenstored in a dataset
that allows the system
to select fingerprints to perform either individual comparisons or scarches through the
appropriate database(s) depending on the use case.
Fingerprints can be recorded using paper and ink but most current biometric applications
use either a scanner, where the finger is placed on or rolled across a platen, or a
contactless method that captures the required detail at a proximal distance. This method s
becoming increasingly popular because of the potential hygiene issues associated with
methods
multiple enrolments on the same platen. However, any of
these enrolment
require cooperation from the subject and ofen human supervision at m
he
enrolment to assure the quality of the biometric data.
rate
Heartbeat-Individuals produce a distinctive heartbeat, regardless of their heart
shape
and level of exertion, that is determined by a number of factors, for example, the
C&NS-92
CRYPTOGRAPHY &
NETWORK SECURITY
size and sounds of the hcart, the arrangcment of the heart valy es and the pressures the
produce and the individual's general physiology and hcaltr. Only the
electron
signature' of the hcartbeat is transmitted and reccived within the biometric system.
characteristics of the heartbcat remainconstant, throughout life, unless they are disrupted
G
and altercd by illness or a serious cardiac cpisode such as a stroke or heart attack.
Odour The primary body odour of individuals has bcen studied to determine the
extent that it is distinctive and stable over time and potentially can be separated trom
other odours conveyed by the human body from sources such as soaps, perfumes, dict
and the cnvironment. Some discascs may disrupt or mask the primary odour. Animals
such as bcars and dogs have a very acute sense of smell and can track and trail hurmans
but the biometric application of odour requires the use of machine olfaction devices that
can detcct and capture human odours for subscqucnt analysis and classi fication as a
bionetric template. These acquisition techniques are contactless and unobtrusive and
consequently could be used with or without the consent or cooperation of the subject. lt
should be noted that odour biometric recognition is primarily a research subject and has
not yet proven to beeffective or practical in real applications.
Voice -A - -
person's voice i.e., the way they sound when they speak is the result of a
combination of distinctive physical attributes (such as the length of vocal cords and the
shape of the throat) and distinctive behavioural attributes (such as the accent with whicha
person speaks).
The human voice consists of 7 creates wave lengths that can be measured. The voice is
collected and analysed by software that employs artificial intelligence and machine
as
learning techniques to produce a vast array of data derived from factors such
modulation of speech, tones, accent, frequency etc. These elements enable the system to
create a reference template of the voice (known as a 'voice print' or 'voice model') that
can be used to authenticate the speaker in subscquent transactions. Similar technology is
a voice
applied to allow devices to understand, translate and interact with
command/question, for example, when talking to smart speakers, mobile devices,
domestic appliances, virtual assistants.
your business, and it can similarly
c) Your website could be among the greatest assets in
be a key vulnerability. All the effort you invested to generate traffic and promote your
security
brand online could end up in flames if you do not know the different network
covers the five common problems and
threats and their solutions. This three-minute read
how to fix them. programs, we
and all
1. Worms and viruses: We have all heard about these malicious core
systems, destroy
have fears. They usually attach to a host file or system then infect
Furthermore, they can infect
crucial information, and make your network inoperable.
networked systems and create
avenues for other advanced threats.
on your systems or devices. Also, you
The remedy is to install anti-malware solutions
should ensure that the software is up to date and implement protective
strategies for your
local and cloud resident information.
C&NS-93
POPULAR PUBLICATIONS
2016s Harvard
Information cited by the Busine
2. Abuse of account privilegcs: of
all attancks are trom insiders. From
a whopping 60 percent
Review indicates that and intentional lcaks, to identity hone
mistakes to misuse of account privilcgeS
thel, orany
compromisc the sccurity of user account data individua
other engincering attack to problems.
are among your najor sccurity
your premises ternms of user acccss.
it
Inside
If You use POLP(policy of lcast privilcged) in is possible
can also mitigate the risk
case of such an attack. You to
minimize the damage in visibility, through
tools that allow context and
cndpoint auditing and monitoring Regardless of yourtireless cfforts, an attacker
3, Insufficient defence in
depth: Can
security. But it is the network structure that determines theextent sili
breach your network are at higher
structures risk once of
the damage. Organizations with open network
the
access to a trusted system.
attacker obtains unfettered
To avoid this, you should
structure your network with strong segmentation.
prevent them from This
scparates all thediscrete parts to slow down the attacker and acceing
the vital system as you address the threat. Even with the most reliable cyber-securiy
4. Insuficient IT security management:
threats since they lack enough skilled
solutions, most organizations may still face
As a result, you may miss crucial security alerts,
l
1Workforce to manage the rcsources well.
may not be countered early enough to minimize the damage.
and any successful attack
This avoidable threat can be dealt with by hiring enough skilled talent
fast
and secure your
partnering with reliable service providers to eliminate the risk systems,
5.
Ransomware: This is among the most unpredictable and feared thrcats, with overal
secure svet
business detection rising to 79% in 2018 alone. Attackers usually infect
encrypt data, and thrcaten to corrupt or delete the files if they are not paid some hef
ransom anonymously.
The necessary defensive strategies necessary for this threat include antivirus software,
updating your security patches, and teaching staf how they can identify phishing attacks
You also need a backup and recovery strategy to reduce the impact.
With these tips, you now understand what you need to recover and securc your network
systems.
C&NS-94
RYPTQGRAPHY &
NETWORK SECURITY
sent) to prevent replay attacks. When replay detection is enabled, sequence numbers are
never reused, because a new security association must be renegotiated before an attempt
to incremnent the sequence number beyond its maximum value.
Itegrity Check Value (multiple of32 bits)
Variable lengths check value. It may contain padding to align the field to an 8-octet
boundary for IPv6, or a 4-0ctet boundary for IPv4.
b) Ipsec:
IPSec, is a framework of open standards (from IETF) that define policies for secure
communication in a network. In addition, these standards also describe how to enforce
these policies.
C&NS-95
POPULAR PUBLICATIONS
machines) can achieve
pecrs(computers or network layer
Using lPSec. participating authentication at the (1.e. Layerda
data RFC 2401 3o
confidentiality, data inegrity, and 7-laycr networking
model).
specities
Interconncction the
the Open Systems systems.
IPsec compliant various security
base architecture for architecture is to provide also services
This RFC says that "the goal
of the cnvironments." Sce RFC2402, fo
both the IPv4 and
IPvó RFC
tratic at the lP layer, inmore details on IPScc.
2406 and RFC 2407 for provide interoperable, high quality, cryptographically.
The main purpose of IPSec is
to security services at the 1P layer
It offers various
lPv4 and IPv6. and
based security for (i.e. IP) and higher laycrs. These security services
at this are,
therefore, offers proection connectionless integrity, data origin authenticaion,
for examplc, access control, sequence integrity), confidentialiy
form of partial
protection against replays (a
(cncryption), and limited traffic flow confidentiality.
mode (host-to-host) and Tunnel Mode
IPSec has two different modes: Transport
or Gatevway-to-host). In transport mode, the payload
(Gateway-io-Gateway is
is left intact) and the end-host (to which, the IP packet addressed)
is
cncapsulated (header
is entirely encapsulatcd (w
decapsulates the packet. In the tunnel mode, the lP packet
new IP header, decapsulates the
ney header). The host (or gateway), specified in the
no necd for client software to run on t
packet. Note that, in tunnel mode, there is
gateway and the communication between clienl sysiems and gateways are not protected,
IPSec standard supports the following features:
AH (Authentication Header) that provides authenticity guarantee for transpornet
packets.. This is done by check-summing the packages using a cryptagraphic
algorithm.
ESP (Encapsulating Security Payload) that provides encryption of packets.
IPcomp (IP payload compression) that provides compression before a packet is
encrypted.
IKE (Internet Key Exchange) provides the (optional) means to negotiate keys in
secrecy.
C&NS-96
CRYITOGRAPHY &
NETWORK SECURITY
8. a) What are the different sub-protocols definod by SSL? Explain one of them.
b) How can a Digital Certificate bo vorifiod? [MODEL QUESTIONJ
Answer:
a) 1" part:
Different sub-protocols defined by SSL:
Handshake: This sub-protocolnegotiates session information between the client and the
server. The session information includes the session ID, the
comprcssion algorithm to be
used, and a sharcd secret used to generate keys.
Change Cipher Spee: This sub-protocol consists of a single message to tell the other
party in the SSL session, who is known as the pcer, that the sender wants to change to a
new set of encryption keys. The keys are computcd from the information that is
eschanged by the Handshake sub-protocol.
Alert: This sub-protocol generates error messages as well as status alerts. Alerts are
commonly scnt when the connection is closcd, an invalid message is received, a message
cannot be decrypted or the uscr cancels the operation.
2nd part:
SSL handshake protocol is very effective for clients and server complete the mutual
authentication, the main process is as follows:
(1) the client's browser to the server sending the client SSL protocol version number, the
type of encryption algorithm to generate random numbers, and other communications
between servers and clients all the information needed.
(2) SSL server sent to the lient protocol version number, the type of encryption
algorithm, random number and other relevant information to the client while the server
will send its own certificate.
(3) customers using the server information transfer over the legitimacy of the
authentication server, the server's legitimacy, including: the certificate is expired, the CA
issued the server certificate is reliable, the public key of the certificate issuer server
ccrtificate can correctly solve the "issuer digital signature ", the server certificate on the
domain name is the actual domain name and server match. 1f the legitimacy of
verification does not pass, communication will be disconnected; if legitimacy is
validated, will continue to the fourth step.
(4) client generates a random back communications for the "symmetric key", and then
use the server's public key (the server's public key from the steps of the server's certificate
(2) obiained) for its encryption, and then encrypted the "pre-primary password "pass the
Server.
(5) If the server requires a clicnt's identity authentication (Zai handshake Zhongwei
optional), the user can create a Sui Jishu and its Jinxing Shujuqianming to incorporate the
Han You signed random number and the customer had their own certificates, and Jia Mi's
"pre-primary password "pass with the server.
(6) If the server requires client authentication, the server
nmust verify client certificate and
the signature of random numbers of legitimacy, the legitimacy of the specific validation
process includes: customers use the date the certificate is valid, the CA certificates to
can
provide Customers with the reliability issue of CA, client certificate public key
C&NS-97
POPULAR PUBLICATIONS
C&NS-98
CRYTOGRAPHY &
NETWORK SECURITY
C&NS-99
POPULAR PUBLICATIONS Netscape's Secure Sockets
makes use of
confidentiality. SET Technology (STT), and Terisa System's
that ensures privacy and Transaction not all
Microsof's Secure SET uses some but aspects of a
Layer (SSL). Protocol
(S-HTTP).
Secure Hypertest Transfer how SET works:
key intrastructure (PKI).Here's
browser such as Netscapc a or MicrOSof':
public a SET-enabled has SET-enabled
Assume that
a customer has
provider (bank, store, elc.)
the transaction
Intenet Explorer and that account. Any issuer of a credit
server. or Visa bank
opens a Mastercard
1. The customer
tile functions as a
card some kind of
bank. This elcctronic
a digital certificate.
2. The customer receives transactions. It includes a public
purchases or other
credit card for online a digital switch to the bank to
has been through
key an cxpiration date. It
with
ensure its validity. bank. These certificates
receive certificates fron the
3. Third-party merchants also key.
merchant's public key and the bank's public meane
include the
an overa Wcb page, by phone, or some other
4. The customer
places order merchant's certicua
customer's browser receives and confims trom the
5. The
that the merchant is valid. message is encrypted with the
sends the order infor:nation. This
6. The browser the
public kcy, the payment infornation, which is encrypted with
merchant's that
(which cant be read by the merchant), and information
bank's public key
particular order.
ensures the payment can only be used with this
7. The merchant verifies the customer by checking the
digital signature on the
customer's certificate. This may be done by referring the
certificate to the bank or
to a third-party verifier.
8. The nerchant sends the order message along to the bank. This
includes the bank's
cant
public key, the customer's payment information (which the merchant
decode), and the merchant's certificate.
9. The bank verifies the merchant and the message. The bank uses the digital
signature on the certificate with the message and verifies the payment part of the
message.
10. The bank digitally signs and sends authorization to the merchant, who can then
fillthe order.
C&NS-100
CRYITOGRAPHY& NETWORK SECURITY
C&NS-101
POPULARPUBLICATIONS
[MODEL
aUESTIO
RFCfor MIME?
5. What is the
mnemoranda: RFC 2045, RFC 2046.
RFC
Answer: specificd in sis linked define the specifications.RFC2041,
MIME is 2049, which together
4289 and RFC
RFC 428S, RFC
[MODEL
Functionalities aUESTIOH
6.What are the SIMIME
Answer:
to sign and encrypt messages.
SMIME has ability content and encryption keys
for one or more
recipients
- encrypted
Enveloped data encrypted using private key of
- message digest of content is sender, Contert
Signed data
are then encoded
and signature digital signature isencoded.
Clear-signed data - only the -
signed-only and encrypted-only entities may be nested
Signed and enveloped data
C&NS-102
CRYITOGRAPHY &
NETWORK SECURITY
C&NS-103
POPULAR
PUBLICATIONS
PGP and S/MIME, WBUT
2. Compare managoment in 2018)
Answer: and contrast key
PGP stands pretty goodIprivacy. intcrnet mail extcnsion.
is for the securcd/multipurpose
S/MIME for the the PGPaand S/MIME
Followingtable is stands betwecn
describe the diflerence S/MIME
PGP S/MIME is also string standard but
PGP is in S/MIME. there
the
strong standard.
encryption sorne (laws is
Elgamal digital. signature is used.
Diffic hellman 1024 public keys in S/MIME.
digital signature is used. There is
Therc are 4096
But S/MIME is used EMAIL services
PGP.
It
public keys in
also uscd in virtual networks. digital certificate standard only.
The digital certificate private t PGP is PGP.
The
in S/MIMIE
standard in X.S09.
C&NS-104
RYPTOGRAPHY &
NETWORK SECURITY
1
The session key isencrypted using cach recipient's public key.
These "cncrypted session kcys" start the message.
The sending OpenPGP encrypts the message using the session kcy. which forms the
remainder of the message. Note that the message is also usually cornpressed.
5. The recciving OpenPGP decrypts the session key using the recipient's private key.
6. The receiving OpcnPGP decrypts the message using the session key.
Ifthe message was compresšed. it will be decompressed.
Authentication via Digital Signature
The digital signature uses a hash code or message digest algorithm, and a public-key
signature algorithm. The sequence is as follows:
1. The sender creates a message.
2. The sending software generates a hash code of the message.
3. The sending software generates a signature from the hash code using the sender's
private key.
4. The binary signature is attached to the message.
5. The receiving software keeps a copy of the message signature.
6. The receiving software generates a new hash code for the received message and
verifies it using the message's signature. If the verification is successful, the message
is accepted as authentic.
Compression:
Open PGP implementations SHOULD compress the message after applying the signature
but before encryption.
b) S/MIME:
Messages
SIMIME secures a MIME entity by signature and /or encryption
MIME entity may be entire message or one / more subparts ofa
message
a
MIME entity along with related security data are processed to produce PKCS object
to be sent is
which is treated as message content and wrapped in MIME. Message
converted into canonical form (i.e., a format appropriate to the content typc, that is
standardized for use between systems)
in an outer MIME
Resultant message (after applying security algorithm) is wrapped
message and transfer encoding applied.
C&NS-105
POPULARPUBLICATIONS
C&NS-106
CRYITOGRAPHY& NETWORK SECURITY
FIREWALL
Very Short Answer Type guestions
a WBUT 2014, 2016, 2019]
4 Firewall is a speclallzed form of
a) Bridge b) Switch c) Network d) Router
Answer: (d)
[WBUT 2018]
2. Firewall should be situatod
a) inside a corporato network
b) outside a corporate network
c) between a corporate network and the outsido word
d) none of the above
Answer: (c)
WBUT 2023]
3, Types of firewall are or both
Answer: Software firewalls, hardware firewalls,
(WBUT 2023]
4.Define firewall.
Answcr: and blocking cyber threats
A Firewall is a barrier between two networks identifying
while allowing appropriate traffic through.
[WBUT 2023]
5. A proxy gateway is a
Answer: requests and forwards them to endpoints that
Service gateway that receives web service
you definc in proxy groups.
Answer:
There are sevcral classifications of firewalls depending on:
between a single node and the
Whether the communication is being done
network, or betwcen two or
more networks.
at the network layer, or at the
Whether the communication is intercepted
application layer. at the firewall or not.
Whether the communication state is being tracked
depending on whether the firewalls keep track of the state of network
Similarly,
two categories of firewalls exist:
connections or treats cach packet in isolation,
C&NS-107
POPULAR PUBLICATIONS
Stateful firewalls
a destination
Statcless firewalls a source to based on
limits nctwork infomation from port and the
A
stateful ) Sirewall address, source TCP/UDP destinaticn
source IP content and chcck for protocol
destination 1P address. can also inspcct date
TCP/UDP port. Stateful fircwalls
much bctter cquipped than proxy filter or
a
a stateful firewall is A proxy filter
anomalies. For Cxample,. denial-of-scrvice attack.
or paclet
filter is
a
packet filter to detcct and stop BecauSC
detcctig such an attack.whcther it the
source
of and
ill-equipped and incapable through is legitimate or an
data is permitted
destination address are valid, the illustrates the inspection depth of a stateful
attempted hack into the network. Figure 4 of the OSI model, which is the transport
firewall. Packets are innspected upto Layer anomalics.
Therefore, stateful firewalls are able to inspect protocol
layer. OSI Reference
Application
Presentation
Session
DATA Transport
IP Source IP Destination
Nework
Stateful Inspection
Datu Link
Traftic
Plhysical
Application
Presentaton
Session
IP Source IP Destnation DATA Transport
Network
Packet Filter
Traflic Data Link
Physical
C&NS-108
CRYPTOGRAPHY &
NTWORK SECURITY
C&NS-109
POPULAR PUBLICATIONS
any one types
of firowall and describ0 of firewall
WBUT
4. Explain the technical dotails 2023)
with neat diagran1.
Answer: ofLong Answer 7ype Ouestions.
T"Part: Refer to Questions No. l of Short Answer Tpe Qtestions,
No. I
4 art: Refer to Questions
and trUsted
devices In
firewall
5. What moan by trustod servlce
do you [MODEL QUESTIONI
configuration?
Answer: are specificd to pass through the firewa. Examples
list
The of allowcd services those Trusted devices allow access to your
SSH, Telnet. system
include: Www(HTTP), FTP,
for example ethernet0.
for alltraffic from that devicc,
3rd Part:
A firewall cannot protect against:
malicious insiders
connections that circumvent it
completely new threats
Some viruses
the administrator that does not correctly set it up
C&NS-110
CRYPTOGRArHY &
NETWORK SEÇURITY
following:
2. Write short notes on the
Firewall WBUT 2017, 2018]
a) Network (WBUT 2018, 2019]
b) DMZ
Answer:
Firewal: Refer to Question I ofLong Answer Type Questions.
No.
a)
b) DMZ Network:
ets in the DMZ are pcnnitted to have only linited connectivity to specific hosts in the
intemal network, as thc content of DMZ is not as sccurc as the internal network.
Similarly communication between hosts in the DMZ and to the external network is also
icted, to make the DMZ more secure than the Internet,toand suitable for housing both
these
the
snecial purpose services. This allows hosts in the DMZ communicate with
ioemal and external network. There are two basic configuration exists for a DMZ :
single firewall or three legged model and dual firewall.
In a threc legged model the external network is formed from the ISP to the firewall
on the
first network interface, the internal network is formed from the second network interface,
and the DMZ is formed from the third network interface. The firewall becomes a single
oint of failure for the network and must be able to handle all of the traffic going to the
DMZ as well as the internal network.
in dual firewall approach two firewalls are used to create a DMZ. The first firewall or
front-end or perimeter firewall must be configured to allow traffic destined to the DMZ
only. The second firewall (also called "back-end" or "internal" firewall) only allows
traffic from the DMZ to the internal network.
C&NS-112
CRYITOGRAPHY & NETWORK SECURITY
QUESTION 2016
Group
-A
(Multiple Choice Type Questions)
+
Choose the correct altermatives for the following:
D Interceplion is an atlack on
a If the recipient of message has to be satisfied with the identity of the sender, the principle of
comes into picture.
a) confidentiality Vb) authentication c) integrity d) access control
C&NS-113
POPULAR PUBLICATIONS
Group-D
Questions)
(Short Answer Type
diffusion and
confusion?
2 What is the difference between No, 3.
S\NIMETRIC KEY ALGORITIIM, Short Answer lype Qucstion
Ser Topic:
Group-C
(Long Answer Type Questions)
7 a) Wnat is a worm? What is the difference
between Worm and Virus?
b) What are the key principles
of security?
c) What is DOS (denial-of-service
attack)?
d)What do you mean by network security?
Explain with a suitable model.
a) See Topic: ATTACKS ON CONIPUTERS
& COMMPUTER SECURITY,
Question No. 1. Long Answer Type
b) See Topic: ATTACKS
ON COMPUTERS & COMPUTER
Question No. 2(a). SECURITY, Long Answer Tpe
c) See Topic: ATTACKS
0N COMPUTERS & COMPUTER
Question No. 3. ŠECURITY, Long Answer Type
d) Sce Topic: INTERNET
SECURITY PROTOCOLS,
Type Question No. 2. USER AUTHENTICATION,
Long Answer
8.
a) What do you mean by
asymmetric key encryption?
b) What is the difference Explain.
between symmetric key
c) Describe CBC mode encryption and asymmetric key encrypUo
of encryption process.
a) See Topic: ASYMMETRIC What is Initialization Vector?
KEY ALGORITHM,
Answer Type Question No. DIGITAL SIGNATURE AND RSA, Short
5.
C&NS-114
CRYPIOGRAPHY &
NETWORK SECURITY
See Topic: CR\TTOGRAPIIV: CONCEPTS & TECUNIOUEs, Long Answer Type Question No.
1(b).
part: Sce Topic: CRYTTOGRAPUY: CONCEPTS & TECIINIQUES, Long
Answer Type
Ouestion No. l(a)(2"" part).
ymd nart: See Topic:
S\MM1ETRIC KEY ALGORITIIM, Short Answer Ty pe Question No. l(1" part).
10. a) With the help of diagram, briefly explain how public key cryptography works. Explain with a
diegram how the addition of a digital signature changes the process of public key cryptography.
b) Explain the concepts of confusion and diffusion.
c) Expiain the working principle of RC5.
a) See Topic: ASYMMETRIC KEY ALGORITIIM, DIGITAL SIGNATURE AND RSA, Long Answer
Type Qucstion No. 4(a).
b) See Topic: ASYM1METRICKEY ALGORITIIM, DIGITAL SIGNATURE AND RSA, Long Answer
Type Question No. 4(b).
c) See Topic: SYMMETRIC KEY ALGORITIIM, Long Answer Type Question No. 3(i).
C&NS-115
PQPULAR PUBLICATIONS
QUESTION 2017
Group - A
Questions)
(Multiple Choice Type
any ten of the following
Choose the
1 correct alternatives for
i) Vernam cipher is also called
/b) one-time pad
a) rail-fence technique
d) running-key cipher
c) book Cipher
a) 32 b) 56 Vc) 64 d) 128
a) 8 b) 14 c) 10 Va) 16
C&NS-116
CRYTQGRAPUY &
NETWORK SECURITY
To decrypt
amessage encrypled using RSA, we need the
Va) sender's private key b) sender's public key
c) receiver's private key
d) receiver's public key
Group - B
(Short Answer Type Questions)
2
Discuss the man-in-the-middle attack.
Soe Tonic: ATTACKS ON
COMPUERS & COMPUTER SECURITY, Short Answer Tyne Question
No. 3.
Group-C
(Long Answer Type Questions)
6. a) Explain link encryption and end to end encryption in the location of encryption devices.
b) Explain RSA public key encryption algorithm with example.
c) Define Hash function.
a)See Topic: CRYPTOGRAPIIY: CONCEPTS& TECIINIQUES, Long Answer Type Question No.
4(1).
b) See Topic: ASTMMETRIC KEY ALGORITHM, DIGITAL SIGNATURE AND RSA, Short
Answer Type Qucstion No. 6.
c) See Topic: ASYMMETRIC KEY ALGORITIHM, DIGITAL SIGNATURE AND RSA, Long Answer
7.
concept of Biometric Authentication.
a) Explain in brief the
b) State and explain how IDEAWorks.
c) For a Vernam Cipher do the following:
i) Using pad "ARE encode "TZP"
C&NS-117
POPULAR PUBLICATIONS
message dgest?
8. a) What is mean by key management?
b) What ís HMAC? pharming. What do you
and
c) Differentiate
between phishing
different from SSL?
d) How is SHTTP
key cryptosystem? DIGITAL SIGNATURE AND RSA. Long
e) What is private
ASTMMMETRICKEYALGORITIIM, Answer
a) Sre Topici
l'ype Quetion No.6. SECURITY PROTOCOLS,
ISER AUTHENTICATION, Short
Topic: INTERNET niwer
h) See
Type Question No. 3(b). & COMPUTER SECURITY,
A1TACKS ON
COMPUTERS Short
pan: See Topic: aswer
) 1"
Type Question No. 4(1" part). DIGITAL SIGNATURE AND
ASYMMETRIC KEY ALGORITIIM, RSA,Shor
2 part: Sce Topic:
Answer Typc Questivn No.7.
INTERNET SECURITY
PROTOCOLS, USER ALTIENTICATION, Short
d) Sec T'opic: Answer
9. a) What is firewall?
principle of each.
b)What are different types of firewall? Briefiy explain workng
c) What are the limitations of firewall?
d) What is a worm? How does it differ from a virus?
a) See Tapic: FIREWALL, Long Answer Type Question No. 1(1" part).
b) See Topic: FIREWALL, Short Answer Type Question N. I.
c) See Topic: FIREWALL, Long Answer Type Question No. 1(3 part).
d) See Topic: ATTACKS ON COMPUTERS & COMPUTER SECURITY, Long Anner To.
Question No. 1.
C&NS-118
CRYPTOGRAPHY &
NETWORK SECURITY
9UESTION 2018
Group-A
(Multiple Choice Type Questions)
correct alternatives for the following:
1. Choose the
principles related to a message are
The four primary security
)
Va) confidentiality. authentication, integrity and non-repudiation
confidentiality, access Control, non-repudiation and availability
)
d) availability, access control, authorization and authentication
C&NS-119
POPULAR PUBLICATIONS
as sequence
as diagonals and reading it of
rows
The process
of writing the text IS calleda
) b) Caesar Cipher
a) Rail Fence Technique d)
Homophonic substitution
cipher cipher
c) Mono-alphabetic
not know
with each other, B must
and B want to communicate securely
) IA c) B's private key
Va) A's private key b) A's
public key d)B's publc
key
Group - B
Question
No. 0,
4. What do you use digital signature? What are digital certificates?
See Topic: ASTMMETRIC KEY ALGORITHM, DIGITAL SIGNATURE AND
RSA, Short Annsmer
Type Question No. 8.
Group - C
(Long Answer Type
8. a) What are the Questions)
problems associated
b) Discuss the vernam with clear text password?
cipher.
c) Describe Cipher
Block Chaining
(CBC) mode.
d) State and explain
how IDEA works.
a) See Topic: INTERNET
SECURITY PROTOCOLS,
Type Question No. USER AUTHENTICATION,
6(b). Short A
b) See Topic:
CRYPTOGRAPIIY:
4. CONCEPTS &
TECHNIQES, Short Question Na,
c) See Topic: Answer Type
CRYPTOGRAPIIY:
I(a) (2°part). CONCEPTS &
TECHNIQUES, Nà
Long Answer Type Question
C&NS-120
CRYTOGRAPIY &
NEIWORKSECURITY
alWhat is
the difference between MAC and Message Digest?
h How digital signature can be generaled?
Gompare and contrast MD5 and SHA-1 algorithms.
d What is the difference between a mesSage authentication code and a one-way-hash-function?
a) See Topic: INTERNET SECURITY PROTOCOLS, ('SER AUTIENTICATON, Short Answer
Type Question
No. 7.
I See Topic: ASTMIMETRIC KEY ALGORITIN1, DIGITAL. SIGNATURE. AND RSA, Long Answer
Type Question No.
2(1).
Sec Tonic: ASYMMETRICKEY ALGORITIM, DIGITAL. SIGNATURE AND RSA, Long Answer
Type Question No. 2(b).
A See Tonic: INTERNET SECURTY PROTOCOLS, USER AUTHENTICATION, Long Answer
Type Qucestion No.
4.
6.
Answer Type Question No. 2.
b) SeeTopic: SYMMMETRICKEY ALGORITIIM, Long
ALGORITIINM, DIGITAL SIGNATURE AND RSA, Short
c) See Topic: ASYMMETRIC KEY
2.
Answer Type Question No. Type Question No.
d) See Topic: CRYPTOGRAPIY:
CONCEPTS & TECINIQUES, Short Answer
11.
C&NS-121
POPULARPUBLICATIONS
following
on anythree
of
the
12 Wrte he short notes
a) Biometric Authentication
b) Firewal!
c) DES
d) DMZ Nehwork
e) Cryptanalysis ('SER AUTHENTICATION,
INTERNET SECURIT PROTOCOLS, Long
a) See Topic: Anwer
Type Qucestion No. l. 2(a).
Type Question No.
F7REWALL, Long Answer
b) Sce Topic: e
S\MMETRICKEYALGORITIIMl, Short Answer Type Qucstion No
c)Sec Topic:
No. 2(b).
Long Answer Type Question
d)Sce Topic: IREWALL, TECIINIQU'ES, Long Answer
*) Sec Tapic:
CRYPTOGRAPHY: CONCEPTS & Typc Question
QUESTION 2019
Group - A
(Multiple Choice Type Questions)
1. Choose the correct alternatives for the following:
) Firewall is a specialized form of a
b) disk c) printer Vd) router
a) bridge
C&NS-122
CRYTOGRAPHY&NETWORK SECURITY
aua
Which of the following is a monoalphabetic cipher?
a) vigenere
cipher Vb) ceaser cipher c) autokey cipher d) all of these
Group -B
(Short Answer Type Qucstions)
al Explaun the differences betweern asymmetric key and symmetric key cryptography.
b) What is meant by IP shiftingand IP spoofing?
a See Topic: CRYlTOGRAPIIY: CONCEPTS & TECHNIQUES, Long Answer Type Question No.
1(b).
k Soe Tonic: ATTACKS ON COMPUTERS & COMPUTER SECURITY, Long Answer Type
Question No. 2(b).
algorithm?
What type of key is generated or exchanged by using Diffie-Hellman key exchange
3
No. 7.
Group- C
(Long Answer Type Questions)
. 13, Q=31. Find out N, E, D in RSA encryption process.
a) Given prime
2 numbers P=
D)Why is SSL layer position between application and
transport layer?
C&NS-123
PUBLICGATIONS
POPULAR
How is SHTTP different from
of digital certificate.
G) Name four key
sleps in creation
KEYAL.GORITUM. DIGITAL SIGNATURE ASD
SSL
AS\MAIETRIC RSA.Short
n) See Topic:
Answer 'ype Qucstion No. I. I 'SER ALTIIENTICATION.
INTERNET SECURITY PROTOCOLS, Short
Tapic:
b) See AnImtr
Type Qucestion No. 6. PROTOCOLS, ('SER AUIUENTICATlO,
INTERVET SECURITY Long Anw.
e) Sce T'opic:
Type Question No. 3(a).
C&NS-124
CRYITOGRAPUY& NETORK SECURITY
a) S/MIME
b)Digital Signatures
c) IPSec
d) DMZ Network
e) Brometric
Authentication
See Tonic: ELECTRONIC MAIL SECURITY, Long Answer Type Question No. 3(b).
Answer
k See Tonic: ASMMETRIC KE ALGORITIUM, DIGITAL SIGNATI RE AND RSA, Long
Type Question
No. 8(a).
See Topic: INTERNET SECURITY PROTOCOLS, (SER AUTHENTICATION,
Long Answer
QUESTION 2023
Group- A
(Very Short Answer Type Question)
iv) The protocol is responsible for sending change Cipher Spec messages.
See Topic: INTER:NET SECURITY PROTOCOLS, USER AUTIHENTICATION, Very Short Answer
Type Question No. 4.
C&NS-125
POPULAR PUBLICATIONS
encryption and decryption
number of keys for
uses Answer Typc Qucstion No. 5.
vi) AES algorithm KEYALGORITIIM, Very Short
Sec SVMMETRIC
Iopic:
provide
message integrity.
algonithm in order to Very Short Answer
vii) SSL use TECHNIQUES,
&
Type
(RYPTOGRAPIIY': CONCEPTS Question
See Topic:
No. 23.
of operation in
DES is used for operating short data?
modes
vii) Which one of
the followng
KEYALGORITIHM, Very Short Answer
Type Question No. 6.
Sce Topic: SY\MNETRIC
xii) A proxygateway is a
See Topic: FIREWALL, Very Short Answer Ty pe (Quetion No. S.
-
Group B
(Short Ansner Type (Question)
C&NS-126
CRYITOGRAPHY &
NETWORKSECURIY
K
Compare stream cipher with block cipher with proper example.
Eor Tonic:CRYPTOGRAPIY: CONCEPTS & TECINIQUES, Short Answer Type Question No. 13.
No. 12.
,d Purt: See Topic: ATTACKS ON COMPUTERS & COMP("TER SECURITY, Long Answer Type
Question No. 2.(u).
Group - C
(Long Answer Type Question)
No. 4.
d) What is Zombie?
a) See Topic: INTERNET SECURIT PROTOCOLS, USER
AUTIIENTICATION, Long Answer
Type Question No. 6.
SECURITY, Long Answer Type
b) Sec Topic: ATTACKS ON COMPUTERS & COMPUTER
Question No. S.
No. 8.
c) CRYPTOGRAPHY: CONCEPTS & TECHNIQUES, Long Answer Type Question
See Topic:
SECURITY, Long Answer Type
d) See Topic: ATTACKS ON COMPUTERS & COMPTER
Question No. 6.
C&NS-127
POPULAR PUBLICATIONS
C&NS-128