0% found this document useful (0 votes)
23 views4 pages

Digital Signatures and Web Security Insights

The document outlines various aspects of digital signatures, including their security services such as authentication, integrity, and non-repudiation. It discusses limitations of SMTP, differences between transport and tunnel modes, and the significance of web log files and web security challenges. Additionally, it covers legal, ethical, and security implications of digital signatures across industries, performance comparisons of PGP and S/MIME, and the role of digital signatures in secure electronic transactions and online financial systems.

Uploaded by

yashwanthroyal0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

Digital Signatures and Web Security Insights

The document outlines various aspects of digital signatures, including their security services such as authentication, integrity, and non-repudiation. It discusses limitations of SMTP, differences between transport and tunnel modes, and the significance of web log files and web security challenges. Additionally, it covers legal, ethical, and security implications of digital signatures across industries, performance comparisons of PGP and S/MIME, and the role of digital signatures in secure electronic transactions and online financial systems.

Uploaded by

yashwanthroyal0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

PART – A (5 X 2 =10 Marks)

1. What are the security services provided by digital signature?

 Authentication: Verifies the sender's identity by associating the


signature with the sender's private key.
 Integrity: Ensures the message has not been tampered with during
transit.
 Non-Repudiation: Prevents the sender from denying their
involvement in the transaction or message.
2. List their limitations of SMTP/REC 822.

 Lack of Security: Does not provide encryption or authentication,


making emails vulnerable to eavesdropping and spoofing.
 No Support for Multimedia: Limited to plain text; does not
handle attachments or multimedia content efficiently.
 Reliability Issues: Cannot guarantee message delivery or protect
against delays.
3. Difference between Transport mode and Tunnel mode.

Aspect Transport Mode Tunnel Mode


Encrypts only the
Encryption Encrypts the entire IP packet
payload (data) of the IP
Scope (header and payload).
packet.
Used for end-to-end Used for network-to-network
Use Case communication (e.g., or network-to-host
host-to-host). communication.
More efficient as the Slightly slower due to
Performance
header is not encrypted. encryption of the entire packet.

4. Summarize about web log file.

 Definition: A web log file is a record of all requests made to a web


server, containing details like IP address, timestamp, requested
resources, and response codes.
 Purpose: Useful for analyzing website traffic, diagnosing issues,
and enhancing security through intrusion detection.
5. Illustrate the primary facts of web security problem.

 Vulnerabilities: Web applications are prone to attacks like SQL


injection, XSS, and CSRF due to poor coding practices.
 Data Breaches: Compromised security can lead to theft of
sensitive user data.
 Authentication Issues: Weak password policies and improper
session management increase risks.
 Mitigation: Web security requires robust measures like encryption,
secure coding, and regular vulnerability assessments.
PART – B (5 X 10 =50 Marks)
6.a. Classify the stages in legal, ethical, and security implications of digital
signatures in various industries, including finance, healthcare, and
government.

 Introduction to Digital Signatures (2 marks)


 Legal Implications (2 marks)
 Ethical Implications (2 marks)
 Security Implications (2 marks)
 Industry-Specific Applications and Challenges (2 marks)

(Or)
6.b. Explain the digital signature standards and public key infrastructure (PKI)
frameworks support compliance with legal regulations and industry best
practices.

 Introduction (2 Marks)
 Digital Signature Standards (3 Marks)
 Public Key Infrastructure (PKI) Frameworks (3 Marks)
 Legal and Industry Compliance (2 Marks)

7.a. Summarize the performance of PGP, Compare it with S/MIME.

 Introduction (2 Marks)
 Performance of PGP (3 Marks)
 Comparison with S/MIME (3 Marks)
 Use Cases and Suitability (2 Marks)

(Or)
7.b. Demonstrate the integrity of message is ensured without source
authentication.

 Introduction (2 Marks)
 Techniques to Ensure Integrity (3 Marks)
 Practical Examples (3 Marks)
 Limitations and Applications (2 Marks)

8.a Illustrate the security challenges associated with authentication protocols


and how they are mitigated.

 Introduction (2 Marks)
 Security Challenges (4 Marks)

 Replay Attacks
 Man-in-the-Middle (MITM) Attacks
 Impersonation Attacks
 Password-Based Attacks
 Key Management Issues

 Mitigation Strategies (4 Marks)

 Timestamps and Nonces


 Secure Channels
 Two-Factor Authentication (2FA)
 Strong Password Policies
 PKI and Digital Certificates
 Cryptographic Protocols
(Or)
8.b Explain PGP cryptographic functions, explain the security features offered
for e-mails in detail.

 Introduction to PGP (2 Marks)


 PGP Cryptographic Functions (4 Marks)

 Public-Key Cryptography
 Symmetric Encryption
 Digital Signatures
 Hashing

 Security Features for Emails (4 Marks)

 Confidentiality
 Integrity
 Authentication
 Non-Repudiation
 Key Revocation

9.a Discuss about concept of Secure Electronic Transaction (SET) and its
importance in securing online payment systems.

 Introduction to SET (2 Marks)


 Concept of SET (3 Marks)

 Encryption
 Digital Certificates
 Dual Signature Mechanism
 Three-Way Communication
 Message Integrity

 Importance in Securing Online Payment Systems (3 Marks)

 Data Confidentiality
 Authentication
 Integrity Assurance
 Fraud Prevention
 Trust in E-Commerce

 Conclusion (2 Marks)

(Or)
9.b List the role of DS verification in the Secure Electronic Transaction (SET)
protocol.

 Introduction to Digital Signature in SET (2 Marks)


 Roles of DS Verification in SET (6 Marks)

 Authentication (2 Marks)
 Message Integrity (1 Mark)
 Non-Repudiation (1 Mark)
 Dual Signature Verification (2 Marks)
 Importance in Secure Transactions (2 Marks)

10.a Summarize the objectives, architecture, and operation of Secure Sockets


Layer (SSL).

 Objectives of SSL (1 Marks)


 Architecture of SSL (4 Marks)

 SSL Handshake Protocol


 SSL Record Protocol
 Session Keys
 Protocol Layers

 Operation of SSL (4 Marks)

 Handshake Phase (2 Marks)


 Data Transmission Phase (1 Mark)
 Session Termination Phase (1 Mark)

 Conclusion (1 Marks)

(Or)
10.b Explain digital signatures are used to authenticate entities and ensure
transaction integrity in online financial systems.

 Introduction to Digital Signatures in Financial Systems (1 Marks)


 Role of Digital Signatures in Authentication (4 Marks)

 Entity Authentication (2 Marks)


 Non-Repudiation (2 Marks)

 Role of Digital Signatures in Ensuring Integrity (4 Marks)

 Data Integrity (2 Marks)


 Encryption and Secure Communication (2 Marks)

 Conclusion (1 Marks)

You might also like