Cryptography and Network Security Predicted
Cryptography and Network Security Predicted
Differentiate between Substitution and SSL is located between the Application and
Transposition techniques. Transport layers.
Substitution: Replaces plaintext characters with
other characters (e.g., Caesar Cipher). 12. Define static and dynamic web pages.
Transposition: Rearranges the order of plaintext Static: Fixed content, same for all users (e.g.,
characters (e.g., Rail Fence). HTML).
Dynamic: Content generated on-the-fly, varies per
2. Define Rail Fence technique. user (e.g., PHP).
A transposition cipher where plaintext is written
in a zigzag pattern across rows and read row by 13. What are the protocols used in IP Security?
row to form ciphertext. Authentication Header (AH), Encapsulating
Security Payload (ESP), Internet Key Exchange
3. What is Brute-force attack? (IKE).
An attack that tries all possible key combinations
to decrypt ciphertext until the correct key is found. 14. Name any three firewall configurations.
Packet Filtering, Application Gateway, Circuit-
4. Define Seed. Level Gateway.
A random value used as initial input in
cryptographic algorithms (e.g., pseudorandom 15. Define Denial of Service (DoS).
number generators) for unique outputs. An attack that overwhelms a system or network to
disrupt availability to legitimate users.
5. Write any one problem with clear text
passwords. 16. Define Digital Envelope.
Clear text passwords are vulnerable to interception A technique combining symmetric and
during transmission, exposing them to attackers. asymmetric encryption to securely transmit a
symmetric key with encrypted data.
6. What is Masquerade attack?
An attack where an unauthorized entity 17. Write the participants involved in SET.
impersonates a legitimate user or system to gain Cardholder, Merchant, Payment Gateway, Issuing
access. Bank.
7. Define Block Cipher. 18. What is the need for security in computer
A cryptographic algorithm that encrypts fixed-size systems?
blocks of plaintext into ciphertext using a To protect data confidentiality, integrity, and
symmetric key (e.g., AES). availability from unauthorized access or attacks.
25. What is the purpose of Encryption and Storage in Secure Hardware: Use
Decryption? Hardware Security Modules (HSMs) or
Encryption: Converts plaintext to ciphertext for smart cards. Example: Banking HSMs.
confidentiality. Encryption of Keys: Encrypt keys with
Decryption: Converts ciphertext back to plaintext AES-256 and a strong passphrase.
for authorized access. Access Control: Implement multi-factor
authentication and role-based access.
26. Differentiate between Symmetric and Example: Biometric verification for
Asymmetric Key Cryptography. admins.
Secure Backup: Store encrypted backups
Symmetric Key Cryptography: offline. Example: USB drives in secure
o Uses a single shared key for vaults.
encryption and decryption. Monitoring and Auditing: Use SIEM tools
o Advantages: Fast, efficient for to log and audit key usage for anomaly
large data. detection.
o Disadvantages: Key distribution is
challenging; less scalable. 29. Explain the role of a Registration Authority
o Example: AES with 256-bit key for in certificate issuance.
file encryption.
Asymmetric Key Cryptography: Identity Verification: Verifies applicant’s
o Uses public and private key pairs. identity (e.g., government ID, domain
o Advantages: Secure key exchange, ownership).
supports digital signatures. CSR Processing: Validates Certificate
o Disadvantages: Slower, requires Signing Request data (public key,
larger keys. organization details).
o Example: RSA for secure email. Liaison with CA: Forwards verified CSRs
Comparison: Symmetric is faster; to Certificate Authority for signing.
asymmetric is secure for key exchange. Policy Enforcement: Ensures compliance
with CA standards (e.g., X.509). Example:
27. Explain Caesar Cipher and Polygram Domain control for SSL.
Substitution Cipher. Record Keeping: Logs certificate details
for auditing and revocation.
Caesar Cipher:
o Monoalphabetic substitution 30. Explain Challenge/Response Token
shifting each letter by a fixed key. Authentication.
o Example: "HELLO" with key=3
becomes "KHOOR". Concept: Server challenges user; token
o Security: Weak, vulnerable to generates response using a secret key,
frequency analysis (26 key avoiding password transmission.
possibilities). Process:
o Use: Educational, not practical. o Server sends a random challenge
Polygram Substitution Cipher: (e.g., nonce).
o Substitutes letter blocks (e.g., o Token computes response with
Playfair Cipher using a 5x5 secret key (e.g., RSA SecurID).
matrix). o Server verifies response.
Security: Dynamic responses prevent o DA: D→F, A→B → FB
replay attacks; key stays secure. o TA: T→Y, A→B → YB
Example: Challenge “123456” yields o SE: S→E, E→U → EU
response “789012”. o CU: C→U, U→R → UR
Applications: VPNs, online banking. o RI: R→U, I→K → UK
o TY: T→Y, Y→Z → YZ
31. Discuss various types of attacks on Ciphertext: FBYBEUURUKYZ
computer systems. Explanation: Encrypts pairs for added
security.
Passive Attacks: Eavesdropping to steal
data. Example: Packet sniffing for 34. Explain SSL protocol and why it's placed
passwords. between application and transport layers.
Active Attacks: Modify or disrupt systems.
Example: Man-in-the-middle altering SSL: Secures communication with
messages. confidentiality, integrity, authentication.
Malware Attacks: Viruses, worms, Components:
ransomware. Example: WannaCry o Handshake: Negotiates keys,
encrypting files. ciphers, certificates.
Social Engineering: Tricking users. o Record: Encrypts, fragments data.
Example: Phishing for credentials. o Alert: Manages errors.
Denial of Service (DoS): Overwhelms o Change Cipher Spec: Activates
systems. Example: Flooding a server to ciphers.
crash it. Placement: Between Application (HTTP)
and Transport (TCP) layers; encrypts data
32. Write and explain RSA Algorithm with an transparently.
example. Example: HTTPS securing credit card
transactions.
RSA: Asymmetric algorithm using Significance: Enables secure protocols like
modular exponentiation. SMTPS.
Steps:
1. Primes: p=3, q=11. 35. Define and explain Digital Signature.
2. n = p × q = 33.
3. φ(n) = (p-1)(q-1) = 20. Definition: Verifies authenticity and
4. Public key e=7 (coprime to 20). integrity of messages.
5. Private key d=3 (d × e ≡ 1 mod Process:
20). 1. Hash message (e.g., SHA-256).
6. Encrypt P=5: C = 5^7 mod 33 = 2. Encrypt hash with private key
14. (signature).
7. Decrypt C=14: P = 14^3 mod 33 = 3. Send message and signature.
5. 4. Receiver decrypts signature with
Explanation: Security from factoring public key, compares hash.
difficulty. Properties: Authenticity, integrity, non-
Applications: SSL/TLS, digital signatures. repudiation.
Example: Signing emails.
33. Encrypt "DATA SECURITY" using Applications: Software distribution,
Playfair Cipher and keyword "SECURE". blockchain.
Key Matrix (SECURE, I/J combined): 36. Define firewall and explain Application
S E C U R Gateway and Packet Filtering.
A B D F G
H I/J K L M Firewall: Monitors and controls network
N O P Q T traffic via rules.
V W X Y Z
Application Gateway:
o Application layer; inspects data
Plaintext: DA TA SE CU RI TY. (e.g., HTTP).
Encryption:
o Example: Proxy filtering web Process:
requests. i. Generate public-private key pair.
o Pros: Granular; Cons: Slower. ii. Submit CSR with public key,
Packet Filtering: identity details to RA.
o Network layer; filters headers (e.g., iii. RA verifies identity, forwards to
IP). CA.
o Example: Router blocking IPs. iv. CA signs certificate (includes key,
o Pros: Fast; Cons: Less secure. identity, validity).
Comparison: Gateway is thorough; v. Deliver certificate to applicant.
filtering is efficient. vi. Use for authentication, encryption.
vii. Standards: X.509 format.
37. Explain Digital Certificate Revocation
process. viii. Applications: SSL/TLS, email
signing.
Concept: Invalidates certificates before
expiration (e.g., compromised key). 40. Explain DES Algorithm with example.
Process:
1. Request revocation (owner or CA). DES: Symmetric block cipher, 64-bit blocks, 56-
2. CA adds certificate to CRL. bit key.
3. Publish CRL to repositories.
4. Parties check CRL or use OCSP Steps:
for status. i. Key Scheduling: Generate 16
Example: Revoking a website’s SSL subkeys.
certificate. ii. Initial Permutation: Rearrange
Challenges: Large CRLs, OCSP plaintext.
connectivity. iii. 16 Rounds: Split block, expand,
Significance: Maintains PKI trust. XOR with subkey, S-boxes,
permute.
38. Explain the principles of Network Security iv. Final Permutation: Produce
in detail. ciphertext.
Components:
o AH: Authentication, integrity.
o ESP: Confidentiality,
authentication, integrity.
o IKE: Manages keys, security
associations.
Modes: Transport (payload), Tunnel
(entire packet).
Architecture: Security Associations,
Security Policy Database, Security
Association Database.
Applications: VPNs, remote access.
Architecture:
o Client: Initiates connection.
o Server/Gateway: Authenticates, routes
traffic.
o Protocols: PPTP, L2TP/IPSec, OpenVPN.
o Encryption: AES, RSA.
o Authentication: Passwords, certificates.
Types: Remote Access, Site-to-Site.
Benefits: Secure, cost-effective.
Challenges: Performance, complexity.