VEL TECH MULTITECH DR.RANGARAJAN DR.
SAKUNTHALA ENGINEERING
COLLEGE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
191CS722-CRYPTOGRAPHY AND NETWORK SECURITY
QUESTION BANK
UNIT I _INTRODUCTION
Security trends , Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple
levels, Security Policies, Model of network security, Security attacks, services and mechanisms,
OSI security architecture, Mathematical Tools for Cryptography :Substitutions and Permutations
Classical encryption techniques : substitution techniques, transposition techniques, steganography,
Foundations of modern cryptography: perfect security, information theory, product cryptosystem ,
cryptanalysis
PART - A
S.NO Q&A CO COGNI
LEVEL TIVE
LEVEL
Which term describes the process of converting plaintext into CO1.1 CL1
1 unreadable cipher text to protect data during transmission?
a) Decryption
b) Encryption
c) Hashing
d) Steganography
2 Which one is the strong attack mechanism? CO1.1 CL1
a) Chosen plaintext attack
b) Chosen cipher text
c) Brute Force Attack
d) Man in the middle attack
3 How does a symmetric encryption algorithm differ from an CO1.1 CL2
asymmetric encryption algorithm?
a) Symmetric algorithms use a single key for both encryption
and decryption, while asymmetric algorithms use different
keys.
b) Symmetric algorithms are more secure than asymmetric
algorithms.
c) Asymmetric algorithms are faster in encrypting data compared to
symmetric algorithms.
d) Symmetric algorithms are only used for data at rest, whereas
asymmetric algorithms are used for data in motion.
4 Which of the following is a reason for implementing security at CO1.2 CL1
multiple levels in cryptography and network security?
a) It reduces the complexity of the security system.
b) It guarantees 100% protection against all types of cyber threats.
c) It ensures compliance with legal regulations.
d) It provides defense-in-depth, making it harder for attackers
to compromise the system.
5 What is the primary purpose of implementing encryption at CO1.2 CL1
multiple levels in network communication?
a) To improve the performance of the network.
b) To ensure easy access to data for authorized users.
c) To protect sensitive information from unauthorized access
and eavesdropping.
d) To simplify the process of data transmission.
6 What type of security policy specifies the rules and requirements CO1.2 CL1
for password complexity and expiration?
a) Access control policy
b) Encryption policy
c) Password policy
d) Firewall policy
7 Which model is used to describe the flow of information through a CO1.3 CL1
network and helps identify potential security vulnerabilities?
a) OSI model
b) TCP/IP model
c) RSA model
d) AES model
8 For confidentiality, data to be sent to receiver side is CO1.3 CL1
a) Encrypted
b) Decrypted
c) Corrected
d) Both (a) and (b)
9 Which security service ensures that data remains unchanged and CO1.4 CL1
tamper-proof during transmission?
a) Authentication
b) Confidentiality
c) Integrity
d) Availability
10 How does a brute-force attack work in the context of password CO1.4 CL2
cracking?
a) It attempts to guess the correct password through social
engineering techniques.
b) It exploits vulnerabilities in the encryption algorithm to recover
the password.
c) It systematically tries all possible combinations of characters
until the correct password is found.
d) It uses precomputed tables to match hashed passwords to their
plaintext equivalents.
11 How does the OSI security architecture differ from the traditional CO1.5 CL2
OSI model in terms of its focus?
a) The OSI security architecture includes additional layers for
encryption and decryption.
b) The OSI security architecture emphasizes physical network
components.
c) The OSI security architecture focuses on security services
and mechanisms for data protection.
d) The OSI security architecture simplifies the network
communication process.
12 What is the primary goal of the OSI security architecture? CO1.5 CL1
a) To define the physical and logical layout of network
components.
b) To standardize network communication protocols for global
interoperability.
c) To provide a reference model for understanding network
security principles and mechanisms.
d) To optimize network performance and bandwidth utilization.
13 What is the purpose of using a permutation key in a transposition CO1.6 CL1
cipher?
a) To encrypt and decrypt the plaintext simultaneously
b) To perform mathematical operations on the plaintext
c) To rearrange the order of characters in the plaintext based
on the key
d) To apply a substitution technique on the plaintext
14 How does the Caesar cipher work as an example of a substitution CO1.6 CL2
cipher?
a) It shifts each character in the plaintext a fixed number of
positions down the alphabet.
b) It uses a random set of characters to replace each character in the
plaintext.
c) It rearranges the order of characters in the plaintext according to
a specific key.
d) It applies a mathematical formula to each character in the
plaintext.
15 In cryptography, a substitution cipher replaces each plaintext CO1.6 CL1
character with a corresponding character from what?
a) A random set of characters
b) A different alphabet
c) A set of numbers
d) The same character
16 Which of the following is a characteristic of a mono alphabetic CO1.7 CL1
substitution cipher?
a) It uses multiple different substitution alphabets.
b) It rearranges the order of characters in the plaintext.
c) It shifts each character in the plaintext by a fixed number of
positions.
d) It replaces each character with a corresponding fixed
substitution.
17 What is the main drawback of a simple Caesar cipher as a CO1.7 CL1
substitution technique?
a) It is susceptible to frequency analysis attacks.
b) It requires a complex mathematical key.
c) It can only encrypt numbers, not letters.
d) It is difficult to implement and use.
18 What is the primary advantage of using a Playfair cipher over a CO1.7 CL1
simple substitution cipher?
a) The Playfair cipher is immune to frequency analysis attacks.
b) The Playfair cipher provides perfect secrecy for encrypted
messages.
c) The Playfair cipher can encrypt numbers, while a simple
substitution cipher cannot.
d) The Playfair cipher eliminates the need for a key to decrypt
messages.
19 In a rail fence cipher, how are the characters of the plaintext CO1.8 CL1
arranged to create the ciphertext?
a) They are shifted by a fixed number of positions down the
alphabet.
b) They are replaced with characters from a different alphabet.
c) They are written in a zigzag pattern along a set number of
rails or lines.
d) They are encrypted using a keyword as the key.
20 Which of the following best describes a transposition cipher? CO1.8 CL1
a) It replaces each plaintext character with a corresponding
character from a different alphabet.
b) It rearranges the order of characters in the plaintext to form
the ciphertext.
c) It encrypts the plaintext using multiple different substitution
alphabets.
d) It shifts each character in the plaintext by a fixed number of
positions down the alphabet.
21 What is the purpose of using a keyword in a columnar transposition CO1.8 CL1
cipher?
a) To specify the number of rails in the rail fence pattern.
b) To determine the fixed number of positions for character
shifting.
c) To indicate the number of columns for arranging the characters
in the plaintext.
d) To specify the order of columns for encryption and
decryption.
22 Which of the following steganographic techniques embeds data by CO1.9 CL1
slightly modifying the least significant bits of digital media?
a) Audio steganography
b) Video steganography
c) Image steganography
d) Text steganography
23 How would you use audio steganography to embed a hidden CO1.9 CL2
message within an audio file?
a) Add white noise to the audio file to hide the message.
b) Encode the message using Morse code and insert it as a separate
track in the audio file.
c) Slightly alter the pitch of specific audio segments to represent
the message.
d) Modify the amplitude of audio samples to encode the hidden
message.
24 Who introduced the concept of perfect security in modern CO1.10 CL1
cryptography?
a) Claude Shannon
b) Alan Turing
c) Whitfield Diffie
d) Martin Hellman
25 What is the fundamental limitation of achieving perfect security in CO1.10 CL1
practical cryptographic systems?
a) It requires an unbreakable encryption algorithm.
b) It is vulnerable to frequency analysis attacks.
c) It relies on a one-time pad key that is as long as the plaintext.
d) It can only be achieved with public-key cryptography.
26 How does the length of the one-time pad key affect the security CO1.10 CL2
level of a perfectly secure cryptosystem?
a) Longer key length provides stronger security against brute-force
attacks.
b) Longer key length reduces the risk of key reuse in different
messages.
c) The key length has no impact on perfect security.
d) Longer key length enables faster encryption and decryption.
27 Information theory quantifies the amount of information in a CO1.11 CL1
message using what unit of measurement?
a) Bits
b) Bytes
c) Characters
d) Kilobytes
28 What does the concept of entropy represent in information theory? CO1.11 CL1
a) The measure of uncertainty or randomness in a message or
data source.
b) The efficiency of a cryptographic algorithm in terms of
processing speed.
c) The total number of bits in a message.
d) The rate at which data is transmitted over a network.
29. Which of the following is a goal of cryptanalysis? CO1.12 CL1
a) Creating strong cryptographic algorithms.
b) Implementing secure network protocols.
c) Breaking encryption to obtain the plaintext from cipher text.
d) Ensuring compliance with security policies.
30. What is the role of cryptanalysis in evaluating the security of a CO1.12 CL1
cryptographic algorithm?
a) To implement the algorithm in various programming languages.
b) To analyze the efficiency of the algorithm in terms of speed and
resource usage.
c) To identify potential weaknesses and vulnerabilities in the
algorithm.
d) To design the key management system for the algorithm.
PART - B
1 Articulate the importance of "CIA” in the context of modern CO1.1 CL2
security trends, in cryptography and network security.
CIA Triad
Importance of CIA in Cryptography and Network Security:
Confidentiality: Confidentiality is fundamental in cryptographic
systems and network security. Encryption techniques are used to
protect sensitive data from unauthorized access, ensuring that only
authorized parties can view the encrypted information. Without
confidentiality, sensitive information could be exposed, leading to
privacy breaches and potential misuse of data.
Integrity: Integrity ensures that data remains unaltered and reliable
during transmission or storage. Cryptographic techniques like hash
functions and digital signatures are used to verify the integrity of
data, ensuring that it has not been tampered with. In network
security, integrity mechanisms detect unauthorized modifications or
alterations in network packets, safeguarding against data
manipulation.
Availability: Availability is critical in both cryptography and
network security. In cryptographic systems, availability ensures that
encryption and decryption services are accessible when needed. In
network security, ensuring high availability of network services and
resources helps prevent service disruptions due to cyberattacks or
other incidents.
2 How does the General Data Protection Regulation address both CO1.2 CL2
legal and ethical aspects of data security and privacy, and what
are the potential consequences for organizations that fail to
comply with its provisions.
Legal Aspects of Security:
1. Compliance with Laws: Security practices should align with
applicable laws and regulations, such as data protection and
privacy laws, intellectual property laws, and
industry-specific regulations.
2. Lawful Monitoring: Organizations must ensure that any
monitoring or surveillance activities conducted for security
purposes comply with relevant laws, including obtaining
consent where required.
3. Incident Response and Reporting: Legal obligations exist
regarding the reporting of security incidents and breaches to
relevant authorities, as well as timely notifications to
affected individuals or organizations.
Ethical Aspects of Security:
Privacy Protection: Respecting the privacy rights of individuals is
crucial. Security measures should be designed to collect and
process personal information only as necessary and with the
appropriate consent.
1. Non-Discrimination: Security practices should not
discriminate against individuals based on protected
characteristics such as race, gender, religion, or disability.
2. Transparency and Accountability: Organizations should be
transparent about their security practices, provide clear
information to users about data handling and protection, and
be accountable for any breaches or misuse of information.
Professional Aspects of Security:
1. Competence and Continuous Learning: Security
professionals should possess the necessary skills and
knowledge to effectively implement security measures.
They should stay updated with evolving threats and
technologies through ongoing professional development.
2. Code of Conduct: Adhering to professional codes of
conduct, such as those defined by industry organizations or
certifications, promotes ethical behavior, integrity, and
professionalism.
3. Confidentiality and Trust: Security professionals should
maintain the confidentiality of sensitive information and
establish trust with clients, stakeholders, and the public
through their actions and expertise.
It is important to note that the legal, ethical, and professional
aspects of security may vary across jurisdictions and industries.
Organizations should consult legal experts, adhere to industry best
practices, and promote a strong culture of ethics and
professionalism within their security practice
3 Provide examples of successful implementations of multilevel CO1.3 CL2
security and the benefits they have brought to the organizations
or entities adopting them.
4. Apply Network Security Policies to design a secure network CO1.4 CL3
infrastructure for an organization, considering firewall
configurations, intrusion detection systems, and VPN usage.
Segregate standard network traffic from management traffic.
Ensure that management traffic on devices comes only from OoB.
Apply encryption to all management channels.
Encrypt all remote access to infrastructure devices such as terminal
or dial-in servers.
5. Compare the strengths and weaknesses of stream ciphers and CO1.5 CL2
block ciphers in terms of security, efficiency, and practical
applications.
Stream Cipher Block Cipher
Stream ciphers encrypt data Block ciphers encrypt data
bit by bit or byte by byte, in fixed-size blocks,
typically in a continuous typically 64 or 128 bits in
stream length.
They are generally faster and Block ciphers provide more
more suitable for real-time robust security and are
communication or high-speed commonly used for secure
applications. storage and data integrity
purposes. and authentication
Stream ciphers typically use a They require padding or
relatively small key size and other techniques to handle
are efficient in encrypting data that is not an exact
large amounts of data multiple of the block size.
One of the commonly used One popular block cipher
stream cipher algorithms is algorithm is the Advanced
the RC4 stream cipher. Encryption Standard (AES).
Example: RC4 (Rivest Example: AES (Advanced
Cipher 4) is a widely known Encryption Standard) is a
stream cipher algorithm. It widely used block cipher
uses a variable key size and algorithm. It operates on
operates by generating a 128-bit blocks and supports
pseudorandom stream of key sizes of 128, 192, and
bytes (key stream) based on 256 bits. AES encrypts data
the key provided. This key in fixed-size blocks, using a
stream is then combined with series of mathematical
the plaintext using XOR transformations, including
operation to produce the substitution, permutation,
cipher text. and XOR operations. It has
been adopted as the standard
encryption algorithm by the
U.S. government and is
widely used in various
applications and protocols.
6. Design a system using the "Authentication" mechanism from CO1.5 CL3
the X.800 framework to securely authenticate users accessing a
sensitive database, explaining the steps involved in the
authentication process.
The system design for secure authentication would involve the
following steps:
User Registration: Users would register with the system,
providing their credentials (username and password).
Authentication Request: When a user attempts to access the
sensitive database, the system prompts for their credentials.
Credential Verification: The system verifies the provided
credentials against the stored user information in the database.
Access Grant: If the credentials are valid, the user is granted
access to the sensitive database.
7. Analyse the potential consequences of a successful hardware CO1.5 CL3
tampering attack on a critical server.
8 Compare the factors that included in Symmetric encryption CO1.6 CL2
and Asymmetric encryption.
Symmetric Asymmetric
Encryption Encryption
Key Usage Same key for Different keys for
encryption and encryption and
decryption decryption
Key Distribution Requires secure key Public key can be
exchange freely distributed
Computational Computationally Computationally
Complexity efficient more complex
Use Cases Encrypting large Key exchange, digital
amounts of data signatures, secure
(file, disk) channels
9 Encrypt the word “Semester Result” with the keyword CO1.7 CL3
“Examination” using play fair cipher.
Step-1: Generate the keyword: Remove duplicate letters from the
keyword and combine it with the remaining letters of the alphabet
(excluding "J" in the case of the Playfair cipher).
Keyword: EXAMINOTBCDFGHKLPQRSUVWXYZ
Step2: Construct the Playfair matrix (5x5 grid):
EXAMINOTBCDFGHKLPQRSUVWYZ
Step3:Divide the plaintext "Semester Result" into pairs of letters
(digraphs) and apply the encryption rules of the Playfair cipher:
SE ME ST ER RE SU LT
● If two letters of a pair are in the same row, replace them
with the letters to their right.
● If two letters of a pair are in the same column, replace them
with the letters below them.
● If the letters of a pair form a rectangle, replace them with
the letters on the opposite corners of the rectangle.
Apply the encryption rules:
SE -> OY
ME -> AL
ST -> QX
ER -> VU
RE -> UV
SU -> FA
LT -> MI
The encrypted ciphertext using the Playfair cipher with the
keyword "Examination" for the plaintext "Semester Result" is: OY
AL QX VU UV FA MI
Therefore, the encrypted ciphertext is: "OYALQXVUUVFAMI".
10 Convert the Given Text “HAPPINESS” into cipher text using CO1.7 CL3
Rail fence Technique with a rail fence of depth of 3.
To convert the given text "HAPPINESS" into cipher text using the
Rail Fence technique, we'll use a rail fence with a specific number
of rails or rows. (Three rails) for this example is used.
Step 1: Write the plaintext in a zigzag pattern along the rails.
1 h i s
2 a p n s
3 p e
Step 2: Read the characters row by row to obtain the cipher text.
Cipher text: "HISAPNSPE”
Therefore, the plaintext "HAPPINESS" is encrypted using the Rail
Fence technique to produce the cipher text "HISAPNSPE”
11 Discuss the challenges and potential risks associated with CO1.8 CL2
steganography, both from the perspective of the sender and the
receiver. What are some countermeasures to detect and prevent
stenographic techniques?
Character marking
Invisible ink
Pin punctures
Typewriter correction ribbon
Hiding a message by using the least significant bits of frames on a
CD
12 Examine How cryptanalysis differs from cryptography, and CO1.9 CL2
how the two fields are interconnected.
Cryptography Cryptanalysis
Definition The practice and The science of
study of techniques to analyzing cryptographic
secure information. systems to uncover
vulnerabilities or break
encryption.
Objective Protecting Breaking encryption,
information from finding weaknesses, and
unauthorized access uncovering the original
or alteration. plaintext without the
correct key.
Focus Designing and Analyzing and studying
implementing cryptographic systems
cryptographic to identify
algorithms and vulnerabilities.
protocols.
Techniques Encryption Frequency analysis,
algorithms, digital brute-force attacks,
signatures, hash chosen-plaintext
functions, etc. attacks, differential
cryptanalysis, etc.
Examples AES (Advanced Breaking a Caesar
Encryption Standard), cipher, analyzing an
RSA RSA implementation
(Rivest-Shamir-Adle for potential
man), SHA-256 vulnerabilities,
(Secure Hash frequency analysis of a
Algorithm), etc. substitution cipher.
Relationship Cryptography Cryptanalysis aims to
provides the means to break or weaken the
secure information. security provided by
cryptography.
Importance Protects sensitive Identifies weaknesses,
information, ensures drives improvements in
secure cryptographic systems,
communication, and and helps assess their
maintains privacy. security levels.
13 Design an information-theoretically secure communication CO1.10 CL2
system, explaining the principles and cryptographic techniques
used to achieve unconditional security.
To design an information-theoretically secure communication
system, the following principles and cryptographic techniques can
be used:
One-Time Pad (OTP): Implement the One-Time Pad encryption
scheme, which uses a truly random and secret key of the same
length as the message to encrypt the data. The key is used only
once and never reused, providing perfect secrecy and unconditional
security.
Key Distribution: Distribute the secret keys through physical
means or secure channels to ensure that the key material remains
secret and does not leak to unauthorized entities.
Key Management: Implement secure key management practices to
prevent key compromise and unauthorized access to keys.
Forward Secrecy: Use forward secrecy techniques to ensure that
the compromise of past secret keys does not affect the security of
future communications.
By combining these principles and cryptographic techniques, the
communication system can achieve information-theoretic security,
providing provable and unconditional protection of sensitive
information.
PART – C
1. Create a security policy document for a fictitious organization, CO1.2 CL2
incorporating the essential components.
2. With a neat block diagram, Generalize the network security CO1.4 CL3
model and the important parameters associated with it.
3. Evaluate the effectiveness of X.800's security services and CO1.5 CL4
mechanisms in protecting against advanced cyber threats like
sophisticated malware and zero-day exploits.
4. Case Study: Secure File Transfer in a Financial Institution CO1.5 CL3
Scenario: A financial institution needs to securely transfer
sensitive financial data between its various branches and partners.
The institution wants to ensure the confidentiality of financial
transactions during transit and prevent unauthorized access to the
data.
Analyse how the OSI security architecture model, along with
cryptography, can be utilized to achieve secure file transfer
within the financial institution's network.
5, Case Study: Secure Communication between Healthcare Facilities CO1.5 CL3
Scenario: Two healthcare facilities, Hospital A and Hospital B,
need to securely exchange patient health records and other sensitive
medical information over the internet. Both hospitals want to
ensure the confidentiality and integrity of the data during
transmission.
Describe how the OSI security architecture model can be
applied to ensure secure communication between Hospital A
and Hospital B using cryptography.
6 Converse an example from real life, where the following CO1.6 CL2
security objectives are needed :
i) Confidentiality.
ii) Integrity.
iii) Non-repudiation.
Suggest suitable security mechanisms to achieve them
7 (i)Examine the strengths and weaknesses of classical encryption CO1.7 CL3
techniques like the Caesar cipher, and explain why they are not
suitable for modern secure communications.(6 marks)
(ii)Suppose you want to send a confidential message to a friend
using the Caesar cipher with a shift of 7. Encrypt the following
message: "MEET ME AT THE PARK."
8 (i)Discuss the strengths and weaknesses of the substitution CO1.8 CL3
technique, specifically the Caesar cipher, and explain why it is
not suitable for modern secure communications.
(ii)Suppose you want to send a confidential message to your
friend using a Caesar cipher with a shift of 5. Encrypt the
following message: "ATTACK AT DAWN."
9 Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, the CO1.9 CL3
message is encrypted by Caesar cipher and k=5. Try to decrypt
the message.
10 Encrypt the following using play fair cipher using the keyword CO1.9 CL3
MONARCHY. Use X for blank spaces “SWARAJ IS MY
BIRTH RIGHT”
11 Perform encryption and decryption using Hill Cipher for the CO1.10 CL3
following. Message: PEN and Key: ACTIVATED.
12 Depict the technique of hill cipher. Encrypt the plain text PAY CO1.10 CL3
MORE MONEY using the
key K= 17 17 5
21 18 21
2 2 19
Show your calculations and the result.
13 List and explain various types of attacks known to CO1.12 CL3
Cryptanalysts in cryptography and network security.
UNIT -2
UNIT- 2 SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY : Algebraic structures , Modular
arithmetic, Euclid’s algorithm, Congruence and matrices, Groups, Rings, Fields, Finite fields,
Chinese remainder theorem-SYMMETRIC KEY CIPHERS: SDES, Block cipher Principles of DES,
Strength of 80 DES, Differential and linear cryptanalysis, Block cipher design principles, Block
cipher mode of operation, Evaluation criteria for AES, Advanced Encryption Standard, IDEA ,RC4,
Key distribution.
PART - A
S.NO Q&A CO COGNI
LEVEL TIVE
LEVEL
Which of the following is NOT a common use of block cipher?
1 (a) S-box
(b) F-function CO2.1 CL1
(c) One-way trap-door function
(d) DES
2 What is 57 mod 7? CO2.1 CL1
0 mod 7
b)1 mod 7
c)7 mod 7
d)-1 mod 7
3 For modular arithmetic what value is the most important CO2.1 CL1
a)Modulo
b) Given no
c) Remainder
d) Divisor
4 What is 99 mod 100? CO2.1 CL1
a)99 mod 100
b) 1 mod 100
c) 100 mod 1
d) 100 mod 99
5 GCD(a,b) = GCD(b,a mod b) CO2.2 CL1
a)True
b)False
6 An Abelian Group satisfies the properties CO2.2 CL1
a) G-i to G-v
b) G-i to R-iv
c) G-i to R-v
d) R-i to R-v
7 A Ring satisfies the properties CO2.4 CL1
a) R-i to R-v
b) G-i to G-iv
c) G-i to R-v
d) G-i to R-iii
8 A Ring is said to be commutative if it also satisfies the property CO2.4 CL1
a) R-vi
b) R-v
c) R-vii
d) R-iv
9 a.(b.c) = (a.b).c is the representation for which property? CO2.5 CL1
a) G-ii
b) G-iii
c) R-ii
d) R-iii
10 a(b+c) = ac+bc is the representation for which property? CO2.5 CL1
a) G-ii
b) G-iii
c) R-ii
d) R-iii
11 An ‘Integral Domain’ satisfies the properties CO2.5 CL1
a) G-i to G-iii
b) G-i to R-v
c) G-i to R-vi
d) G-i to R-iii
12 The 4×4 byte matrices in the AES algorithm are called CO2.6 CL1
a) States
b) Words
c) Transitions
d) Permutations
13 For the AES-128 algorithm there are __________ similar rounds CO2.6 CL1
and _________ round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no
14 What is the size of the key in the SDES algorithm? CO2.6 CL1
a) 24 bits
b) 16 bits
c) 20 bits
d) 10 bits
15 Which of the following modes of operations can be followed for CO2.6 CL1
both stream ciphers as well as block ciphers? Cipher Block
Chaining Mode
a)Cipher Feedback Mode
b)Electronic Codebook Mode
c)All of the above
d)none
16 Like DES, AES also uses Feistel Structure. CO2.7 CL1
a) True
b) False
17 What is the expanded key size of AES-192? CO2.7 CL1
a)2 words
b) 44 words
c) 52 words
d) 64 words
18 Till when was the RC4 algorithm kept a secret? CO2.7 CL1
a)1990
b)1992
c) 1996
d) 1994
19 The DES algorithm has a key length of CO2.8 CL1
a)128
b) 32
c) 64
d) 16
20 Assume input 10-bit key, K: 1010000010 for the SDES algorithm. CO2.8 CL1
What is K1 .
a)10100100
b) 1011011
c) 1101000
d) 10100111
21 DES follows CO2.8 CL1
a)Hash Algorithm
b) Ceasar Cipher
c)WP Network
d) Feistal Cipher
22 The DES Algorithm Cipher System consists of CO2.9 CL1
____________rounds (iterations) each with a round key
a) 12
b) 18
c) 9
d) 16
23 In the DES algorithm the Round Input is 32 bits, which is expanded CO2.9 CL1
to 48 bits via___?
a)Scaling of the existing bits
b)Duplication of the existing bits
c)Addition of zeros
d) Addition of ones
24 The Initial Permutation table/matrix is of size___? CO2.9 CL1
a)16×8
b)12×8
c)8×8
d) 4×8
25 How many round keys are generated in the AES algorithm? CO2.9 CL1
a)11
b)10
c)8
d) 12
26 PDU stands for CO2.10 CL1
a) Protocol data unit
b) Pre data underscore
c) Permuted data unity
d) Protocol data untiy
27 Which of the following is not a type of encryption? CO2.10 CL1
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Compression
28 Which type of encryption uses the same key for both encryption \
and decryption? CO2.10 CL1
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) None of the above
29. Which of the following is an example of a hash function?
a) SHA-1
b) RSA CO2.11 CL1
c) AES
d) Diffie-Hellman
30. Which encryption algorithm is considered to be the strongest?
a) DES
b) RSA CO2.11 CL1
c) Blowfish
d) AES
PART – B
1 Work out gcd (1970, 1066) using Euclid’s algorithm. CO2.2
CL3
2 Calculate gcd (24140, 16762) using Euclid’s algorithm? CO2.2
CL3
3 Outline the five modes of operation of block cipher? CO2.3
CL2
4. Analyse whether symmetric and asymmetric cryptographic CO2.3
algorithm need key exchange.
One reason asymmetric encryption is often regarded as more secure
CL2
than symmetric encryption is that asymmetric encryption, unlike its
counterpart, does not require the exchange of the same
encrypt-decrypt key between two or more parties.
5. Classify four general characteristics of schema for the CO2.4
distribution of the public key.
Public announcement
CL2
Publicly available directory,
Public-key authority
Public-key certificates.
6. Discover the role of session key in public key schemes? CO2.5
A session key is an encryption and decryption key that is randomly
CL3
generated to ensure the security of a communications session
between a user and another computer or between two computers
7. Envision the Structure of Cipher Block Chaining Mode with a CO2.6
diagram.
The Cipher Block Chaining (CBC) mode is a typical block cipher
mode of operation using block cipher algorithm. In this version, we
provide Data Encryption Standard (DES) and Advanced Encryption
Standard (AES) processing ability, the cipherkey length for DES CL2
should be 64 bits, and 128/192/256 bits for AES. Another
limitation is that our working mode works on units of a fixed size
(64 or 128 bits for 1 block), but text in the real world has a variety
of lengths. So, the last block of the text provided to this primitive
must be padded to 128 bits before encryption or decryption.
8 Inspect how does the SDES enhance the Data Security. CO2.7
The S-DES decryption algorithm takes an 8-bit block of ciphertext
and the same 10-bit key can develop that ciphertext as input and CL2
makes the initial 8-bit block of plaintext. These algorithms generate
a key and thus encapsulate the message with this key
9 Categorizes the parameters (block size, key size and no. of CO2
rounds) for the three AES versions.
CL2
10 List out the Challenges and Innovations in implementing a CO2.8
Secure Key Distribution Centre.
In cryptography, a key distribution center (KDC) is part of a
cryptosystem intended to reduce the risks inherent in exchanging CL2
keys. KDCs often operate in systems within which some users may
have permission to use certain services at some times and not at
others.
11 Identify the purpose of S-Boxes in DES? CO2.9
CL2
12 Discuss how the AES is implemented in Real world CO2.11
Applications for secure Communication and Data Storage
Inspect the operations used in AES?
CL3
PART – C
1. Discuss the role of Euclid's algorithm in modern cryptography
and network security. Provide concrete examples of how the
algorithm is applied to enhance security in both domains.
Assess its strengths and limitations, comparing it with CL4
alternative methods for achieving the same objectives. Finally, CO2.2
give your recommendation on whether Euclid's algorithm
should be the primary method used in these fields.
2. Reveal the properties that are to be satisfied by Groups, Rings
CL2
and Fields with an example. CO2.4
3. Elaborate on the problems associated with symmetric key CO2
CL2
ciphers and evaluate Chinese remainder theorem.
4. For each of the following elements of DES, indicate the
comparable element in AES if available. CO2.7
i) XOR of sub key material with the input to the function
(4) CL3
ii) f function (3)
iii) Permutation p (2)
iv) Swapping of halves of the block. (3)
5. Compare and Contrast the following modes of operation in
block cipher. CO2.9 CL3
(i) Electronic code book and Cipher block chaining. (7)
(ii) Cipher feedback mode and output feedback mode. (6)
6. Outline the AES? Diagrammatically illustrate the structure of
AES and describe the steps in AES encryption process with CO2.10 CL2
example.
7. Debate how does the RC4 algorithm generate its initial CO2.11
CL3
permutation of the S-box based on the user-provided key
8. i) Deliberate how does IDEA algorithm preserve Data Integrity CO2.11
and Confidentiality simultaneously?
CL2
ii) Provide an Example for performing Encryption and
Decryption in IDEA algorithm.
UNIT -3
UNIT- 3 PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY : Primes, Primality Testing,
Factorization, Euler‘s totient function, Fermat‘s and Euler‘s Theorem, Chinese Remainder
Theorem , Exponentiation and logarithm, ASYMMETRIC KEY CIPHERS : RSA cryptosystem,
Key distribution, Key management , Diffie Hellman key exchange, ElGamal cryptosystem ,
Elliptic curve arithmetic, Elliptic curve cryptography, Aggregation and Inference Direct Attacks.
PART - A
S.NO Q&A CO COGNI
LEVEL TIVE
LEVEL
An Asymmetric-Key(or public-key)cipher uses
1 a) One Key
b) Two Keys CO3.1 CL1
c) Three Keys
d) Four Keys
2 In public key cryptosystem keys are used for encryption and CO3.1 CL1
decryption
a) Same
b) b) Different
c) Encryption Keys
d) d) None of the above
3 Which of the following keys are known only to the owner? CO3.1 CL2
a)public key
b)protected key
c)private key
d) unique key
4 [(a mod n) – (b mod n)] mod n = (b – a) mod n CO3.3 CL1
a)True
b) False
5 In public key cryptosystem which is kept as public? CO3.3 CL1
a)Decryption keys
b) Encryption keys
c)Encryption & Decryption keys
d) None of the above
6 Which of the following key pairs is used in asymmetric encryption? CO3.3 CL1
a) Two identical keys - one for encryption and one for decryption.
b) Two different keys - one for encryption and one for
decryption.
c) A single key used for both encryption and decryption.
d) A randomly generated key for each message.
7 PKI stands for? CO3.4 CL2
a)public key infrastructure
b)private key infrastructure
c)public key instance
d) private key instance
8 Private key algorithm is used for _____ encryption and public key CO3.4 CL1
algorithm is used for _____ encryption?
a)Messages, session key
b)Session key, messages
c)Can be used for both
d) None of the above
9 The multiplicative Inverse of 24140 mod 40902 is CO3.4 CL1
a) 2355
b) 5343
c) 3534
d) Does not exist
10 What does Fermat's Little Theorem state? CO3.5 CL1
a) Every integer can be expressed as the sum of four squares.
b) The square of an odd prime number is one more than a multiple
of 8.
c) If p is a prime number, then for any integer a, a^p - a is a
multiple of p.
d) The sum of the reciprocals of prime numbers diverges.
11 Sender chooses p = 107, e1 = 2, d = 67, and the random integer is CO3.5 CL2
r=45. Find the plaintext to be transmitted if the ciphertext is (28,9).
a) 45
b) 76
c) 66
d) 13
12 Public-key cryptography is also known as ? CO3.5 CL1
a)asymmetric cryptography
b) symmetric cryptography
c)Both A and B
d) None of the above
13 What is Euler's Totient Function (φ(n)) defined as? CO3.5 CL1
a) The function that calculates the sum of all divisors of a positive
integer n.
b) The function that counts the number of prime factors of a
positive integer n.
c) The function that calculates the number of integers less than
n that are coprimeto n.
d) The function that computes the product of all positive integers
less than n.
14 Euler's Theorem is an extension of which other famous theorem? CO3.6 CL1
A) The Chinese Remainder Theorem
B) The Fermat's Little Theorem
C) The Euclidean Algorithm
D) The Pythagorean Theorem
15 Necessary condition to apply the CRT is the modulo of CO3.7 CL1
congruence should be:
A) Individually prime
B) C) Relatively prime
C) No restriction on Modulo
D) D) None of these
16 RSA is also a stream cipher like Merkel-Hellman CO3.9 CL1
a) True
b) False
17 For RSA to work, the value of P must be less than the value of CO3.9 CL1
a)p
b) q
c) n
d) f
18 In the RSA cryptosystem, which of the following key pairs is used CO3.9 CL1
for encryption and decryption?
a) Two identical keys - one for encryption and one for decryption.
b) Two different keys - one for encryption and one for
decryption.
c) A single key used for both encryption and decryption.
d) A randomly generated key for each message.
19 In RSA,Ф(n)= in terms of p and q CO3.9 CL2
a) (p)/(q)
b) b) (p)(q
c) (p-1)(q-1)
d) (p+1)(q+1)
20 The Chinese Remainder Theorem (CRT) is applicable when CO3.10 CL2
dealing with:
a) Prime numbers and their properties.
b) Finding the greatest common divisor of two integers.
c) Solving systems of congruences with coprime moduli.
d) Calculating modular exponentiation efficiently.
21 Computation of the discrete logarithm is the basis of the CO3.12 CL1
cryptographic system
a) Symmetric
b) Asymmetric
c) Diffiehellman
d) Secret key
22 Which of the following is not a type of symmetric-key CO3.12 CL1
cryptography technique?
a) Ceasar Cipher
b) Data Encryption Technique
c) Playfair Cipher
d) Diffie Hellman
23 How many bytes of the secret key is generated using CO3.12 CL1
Diffie-Hellman encryption/decryption scheme?
a)256
b)871
c)1024
d)962
24 In Elgamal cryptosystem, given the prime p=31, What is the CO3.13
respective plain text character for C=(27,20)?
a) H
CL1
b) L
c) O
d) M
25 Which Cryptographic system uses C1=(e1r)modp and C1=(e2r x CO3.13 CL1
P)mod p at the encryption side?
a)Elgamal
b) RSA
c) ECC
d) Whirlpool
26 In Elgamal cryptosystem, given the prime p=31. Encrypt the CO3.13 CL2
message “HELLO”; use 00 to 25 for encoding. The value of C2 for
character ‘O’ is
a) 09
b) 07
c) 20
d) 27
27 In the ElGamal cryptosystem, which of the following key pairs is CO3.13 CL1
used for encryption and decryption?
a) Two identical keys - one for encryption and one for decryption.
b) Two different keys - one for encryption and one for
decryption.
c) A single key used for both encryption and decryption.
d) A randomly generated key for each message.
28 Elliptic curve cryptography follows the associative property CO3.14 CL1
a)True
b) False
29. “In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “ CO3.14 CL1
a)True
b) False
30. What is an aggregation attack in the context of data privacy? CO3.15 CL2
A) A type of cyber attack aimed at stealing aggregated data from a
single database.
B) A method used to combine multiple datasets to enhance the
accuracy of machine learning models.
C) A technique to mask sensitive data by aggregating it with
non-sensitive information.
D) An attack on privacy in which an attacker combines
anonymized data from multiple sources to de-anonymize
individuals.
PART – B
1 Why is asymmetric cryptography bad for huge data? Specify CO3.1
the reason?
Asymmetric cryptography, also known as public-key cryptography,
is a cryptographic system that uses a pair of keys: a public key for
encryption and a private key for decryption. While asymmetric
cryptography offers several advantages such as secure key
exchange and digital signatures, it can be inefficient for encrypting CL4
large amounts of data. The primary reason is the computational
overhead involved.
Overall, while asymmetric cryptography is highly secure and
suitable for many cryptographic tasks, its inefficiency when
handling large amounts of data makes it less practical for direct
encryption of huge data sets
2 Calculate the primitive root of the prime number 7 CO3.2
Step 1: Find all the residue classes modulo 7. Residue classes
modulo 7 are the remainders when dividing any integer by 7. They
are {0, 1, 2, 3, 4, 5, 6}.
CL3
Step 2: Check each candidate to see if it is a primitive root. A
primitive root is an integer 'g' such that every number in the set of
residue classes modulo 'p' (where 'p' is prime) can be expressed as a
power of 'g'. In other words, the powers of 'g' cover all the residue
classes modulo 'p'.
Let's check candidate primitive roots for 7: Candidate 1: 2 - Powers
of 2 modulo 7: 2^1 ≡ 2 (mod 7), 2^2 ≡ 4 (mod 7), 2^3 ≡ 1 (mod 7),
2^4 ≡ 2 (mod 7)... - The powers of 2 cover the residue classes {1, 2,
4} modulo 7, but they don't cover all the residue classes modulo 7.
So, 2 is not a primitive root of 7.
Candidate 2: 3 - Powers of 3 modulo 7: 3^1 ≡ 3 (mod 7), 3^2 ≡ 2
(mod 7), 3^3 ≡ 6 (mod 7), 3^4 ≡ 4 (mod 7), 3^5 ≡ 5 (mod 7), 3^6 ≡
1 (mod 7)... - The powers of 3 cover all the residue classes {1, 2, 3,
4, 5, 6} modulo 7, which means that 3 is a primitive root of 7.
So, in this example, the primitive root of the prime number 7 is 3
3 Apply Euler's Totient Function to determine the value of φ(12)? CO3.4
Step 1: List the positive integers less than or equal to 12: {1, 2, 3, 4,
5, 6, 7, 8, 9, 10, 11, 12}
Step 2: Identify the numbers that are coprime to 12 (i.e., numbers
that have no common factors other than 1 with 12):
● 1 is coprime to 12 (gcd(1, 12) = 1).
● 5 is coprime to 12 (gcd(5, 12) = 1).
● 7 is coprime to 12 (gcd(7, 12) = 1).
● 11 is coprime to 12 (gcd(11, 12) = 1). CL3
Step 3: Count the coprime numbers. There are 4 numbers between
1 and 12 that are coprime to 12.
Step 4: The value of φ(12) is the count of coprime numbers, which
is 4.
Therefore, φ(12) = 4.
In this example, the Euler's totient function for the number 12 is 4.
It gives us the count of positive integers less than or equal to 12
that are coprime to 12
4. Using Fermat’s Theorem calculate the remainder when 3100 is CO3.5
divided by 7 CL3
5. Solve the following system of congruences using the Chinese CO3.6
Remainder Theorem
CL3
6. Analogize about Exponentiation and Logarithm CO3.7 CL2
7. Can RSA encryption be used for data encryption in real-world CO3.8
applications? If so, what are some use cases.
Yes, RSA encryption is widely used for data encryption in
real-world applications. Its security and mathematical properties
make it suitable for various use cases where secure communication
and data protection are essential. Here are some common
real-world use cases of RSA encryption:
Secure Communication: RSA is commonly used to secure
communication channels, such as emails, instant messaging, and
VPN connections. It ensures that the transmitted data remains
confidential and cannot be intercepted or understood by
unauthorized parties.
.
Digital Signatures: RSA can be used to create digital signatures, CL1
where the private key is used to sign a message, and the
corresponding public key is used to verify the authenticity of the
signature.
.
SSL/TLS Encryption: RSA is an integral part of the SSL/TLS
(Secure Sockets Layer/Transport Layer Security) protocol, which is
used to secure online transactions and web communications.
.
Secure File Transfer: RSA encryption can be used to secure file
transfers, ensuring that sensitive data remains protected during the
transfer process. This is particularly important for organizations
that need to exchange confidential files over the internet.
.
Password Encryption: RSA encryption can be used to store
sensitive data, such as passwords, in a secure way. Instead of
storing plain passwords, systems can store their RSA encrypted
versions, making it harder for attackers to retrieve the original
passwords.
8 User A & B exchange the key using Diffie Hellman algorithm CO3.12
Assume á=5 q=11 XA=2 XB=3. Find the Public Keys of User A
& User B and the shared Key K.
CL3
9 Analyse the potential vulnerabilities of the Diffie-Hellman key CO3.12
exchange, and discuss how can they be mitigated.
Man-in-the-Middle (MITM) Attack:
• Vulnerability: An attacker intercepts the communication
between the two parties and impersonates each party to establish
separate secret keys with both parties, acting as a mediator without
their knowledge.
• Mitigation: To prevent MITM attacks, the Diffie-Hellman
key exchange should be combined with authentication techniques,
such as digital signatures or public key infrastructure (PKI).
CL3
Verifying the authenticity of the public keys before the exchange
ensures that each party communicates directly with the intended
recipient.
.
Small Prime Number or Weak Modulus:
• Vulnerability: If the prime number 'p' and primitive root 'g'
are chosen poorly, the security of the Diffie-Hellman key exchange
can be compromised. For example, using a small prime or a
non-prime modulus could make it susceptible to attacks based on
discrete logarithm problem weaknesses.
Mitigation: It is essential to select large, randomly generated prime
numbers for 'p' and suitable primitive roots for 'g.' Best practices
suggest using at least 2048-bit prime numbers to resist attacks
based on current computational capabilities
10 Compare the security and performance characteristics of CO3.14
elliptic curve cryptography with other public-key
cryptographic algorithms like RSA and DSA.
Key Length and Security:
• ECC: ECC provides a high level of security with shorter
key lengths compared to RSA and DSA.
• RSA and DSA: RSA and DSA typically require longer key
lengths to achieve similar security levels compared to ECC.
Performance:
• ECC: ECC is known for its efficiency, particularly in terms
of key generation, encryption, and decryption operations. RSA and
DSA: RSA and DSA generally require more computational
resources compared to ECC, especially when dealing with larger
CL2
key lengths.
Signature Size:
• ECC: ECC signatures are typically smaller in size compared
to RSA and DSA signatures for the same level of security
• RSA and DSA: RSA and DSA signatures are larger in size,
which can be a concern in bandwidth-limited environments.
Key Management:
• ECC: ECC key management is relatively easier due to the
shorter key lengths. It requires less storage and faster key
generation and distribution.
RSA and DSA: Managing longer RSA and DSA keys can be more
challenging, especially when dealing with a large number of users
or devices.
11 Provide examples of real-world scenarios where aggregation CO3.15
attacks are a concern?
Social Media Profiling: Social media platforms collect vast
amounts of user data, including personal information, interests,
connections, and behaviors. Aggregating this data can allow
malicious actors to create detailed profiles of individuals, which
may be used for targeted advertising, social engineering attacks, or
identity theft.
.
Internet of Things (IoT) Devices: IoT devices collect data about
CL3
users' behaviors and habits in their homes and workplaces.
Aggregation of this data could lead to privacy breaches, enabling
attackers to learn about occupants' daily routines and vulnerabilities
in their security practices.
.
Online Shopping and Financial Data: Online retailers and financial
institutions gather extensive data about customers' purchasing
habits, spending patterns, and financial history. Aggregation attacks
could exploit this data to perform targeted scams, fraud, or
financial theft.
.
Government and Public Databases: Government databases that
store citizen information, such as tax records, social security data,
and census data, can be vulnerable to aggregation attacks.
Unauthorized access to such data could lead to identity theft or
other fraudulent activities
12 Contrast the concept of Inference and Aggregation attack in CO3.15
detail.
Inference Attack:
. Nature of Attack: An inference attack aims to deduce
sensitive information from seemingly innocuous or partially
anonymized data.
. Target Data: Inference attacks are typically focused on
individual records or datasets, attempting to infer hidden details
about individuals or entities within the data.
. Privacy Concerns: Inference attacks can lead to significant
privacy breaches as they unveil sensitive information
. Mitigation: Defending against inference attacks involves
privacy-preserving techniques, such as differential privacy, data
CL2
anonymization, or data perturbation.
Aggregation Attack:
. Nature of Attack: An aggregation attack aims to exploit the
cumulative effect of aggregating multiple pieces of seemingly
unrelated data to deduce sensitive information.
. Target Data: Aggregation attacks focus on the collective
data obtained from multiple sources, seeking to uncover sensitive
information by examining the overall picture.
. Privacy Concerns: It lead to privacy breaches as they reveal
sensitive information by piecing together various bits of data.
Mitigation: Defending often requires controlling data sharing and
applying strict access controls to prevent unauthorized access to
aggregated data.
PART C
1. i) Calculate ϕ ( 100 )? Using Euler’s Totient Funciton CO3.2,CO
ii) Calculate ϕ (240)? 3.4
CL3
iii) Solve using Primality Testing
iv) Solve using Primality Testing if n=11 (prime number)
2. Summarize Chinese Remainder theorem and find X for the CO3.6
given set of congruent equation using CRT . (13)
X ≡ 1 (mod 5) X ≡ 2 (mod 7) X ≡ 3 (mod 9) X ≡ 4(mod 11)
(Or)
CL3
How can the Chinese Remainder theorem, with its fascinating
mathematical interplay of modular arithmetic and unique
solutions, be succinctly conveyed to inspire novel applications
in diverse fields, from cryptography to computer algorithms?
3. i. Depict about RSA algorithm (6) CO3.8
ii.Perform encryption and decryption using RSA algorithm for CL3
the following: p=7 q=11, e=17, M=8.
4. i) In a public-key system using RSA, you intercept the cipher
CO3.8 CL3
text C = 10 sent to a user whose public key is e = 5, n = 35.
What is the plaintext M? (8) ii) In an RSA system, the
public key of a given user is e = 31, n = 3599. Determine the
private key of this user?
5. Users A and B use the Diffie-Hellman key exchange technique, CO3.11
a common prime q=11 and a primitive root alpha=7. (i) If user
A has private key XA=3.What is A’s public key YA? (5) (ii)If CL3
user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm.
6. Reveal how are the Public and Private Keys Generated in CO3.12
ElGamal and Why is Their Interaction Vital for Secure CL2
Communication?"
7. Provide a detailed explanation of Elliptic Curve Cryptography CO3.14
along with an illustrative example using a well-presented CL2
sketch?
8. Suppose that two parties A and B wish to set up a common
secret key (D-H key) between themselves using the Diffie
Hellman key exchange technique. They agree on 7 as the
CO3.11 CL3
modulus and 3 as the primitive root. Party A chooses 2 and
party B chooses 5 as their respective secrets. Find their Key.
GATE 2005
UNIT - 4
UNIT- 4 MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement, Authentication function , MAC , Hash function, Security of hash
function and MAC, SHA, Digital signature and authentication protocols, DSS, Entity Authentication:
Biometrics, Passwords, Challenge Response protocols, Authentication applications , Kerberos, X.509
,P2P and Overlay Systems.
S. Cognitive
Q&A CO
NO LEVEL
PART- A
_____________ is a process which verifies the identity of a
user who wants to access the system.
1 CO4.1 CL1
a) Authentication b)Non-repudiation c)Integrity d)None of the
above
In Authentication without encryption ___is not provided.
2 a) Authentication c) Confidentiality CO4.1 CL1
b) Integrity d) None of the mentioned
In _____ authentication, the claimant proves that she knows the
secret without sending it to the verifier.
3 CO4.2 CL2
a) Zero Knowledge b) Symmetric c) Asymmetric
d) Challenge response
Withdrawing of money from ATM is the example of
Authentication?
a) Something they know and something they have
4 b) Something they are and something they have CO4.2 CL1
c) Both are valid
d) Something they have and something they put
MAC is a_______.
5 a) One-to-one mapping b) many-to-one mapping CO4.3 CL1
c) onto mapping d) none of the mentioned
MAC is used to ensure_____.
a) Authentication c) Confidentiality
6 CO4.3 CL1
b) Authentication & integrity d) Authentication &
confidentiality
Cryptographic hash functions execute faster in software than
block ciphers?
7 a) Statement is correct b) Statement is incorrect CO4.4 CL2
c) Depends on the hash function d) Depends on the
processor
When a Hash function is used to provide message
authentication, the hash function value is referred to as_____?
8 a) Message digest b) Message authentication CO4.4 CL1
code
c) Hashed based MAC d) None of these
Another name for Message authentication codes is____?
a) cryptographic code break b) cryptographic code sum
9 CO4.5 CL1
c) cryptographic check sum d) cryptographic
check break
Message authentication code is also known as___?
a) key code b) hash code
10 CO4.5 CL1
c) keyed hash function d) message key hash
function
What is the number of round computation steps in the SHA-256 CO4.6
11 algorithm? CL1
a) 80 b) 76 c) 64 d) 70
In SHA-512, the message is divided into blocks of size ___ bits
12 for the hash computation? CL2
a) 1024 b) 512 c) 256 d) 1248 CO4.6
The length of Message Digest in SHA 1 is______? CO4.6
13 a)128 b) 160 c) 64 d) 54 CL1
Which system uses a trusted third-party interface?
14 a) Public-Key Certificates b) Public announcements CL1
c) Publicly available directories d) Public-Key authority CO4.7
A digital signature is a mathematical technique which
validates?
15 CO4.7 CL2
a)authenticity b)integrity c)Non-repudiation
d)All of the above
Which of the following is not a type of digital signature? CO4.7
16 a)Approval Signatures b)Non-Certified Signatures CL1
c)Visible Digital Signature d)Invisible Digital Signature
A _________ produces a signature for the document?
17 a)Key generation algorithm b)Signature verifying algorithm CL1
c)Signing algorithm d)Authentication CO4.8
The _____ authentication factor that relate to something that a
user is or does and includes biometric identifiers?
18 CO4.9 CL2
a) Knowledge factor b) Ownership factor c) Inherence Factor
d) Authentication factor
In password selection strategy, minimum length of characters
19 used___? CL1
a) 6 b) 10 c) 8 d) 14 CO4.10
Encapsulating Security Payload (ESP) belongs to which
Internet Security Protocol?
20 CO4.11 CL2
a) Secure Socket Layer Protocol b) Secure IP Protocol
c) Secure Http Protocol d) Transport Layer Security Protocol
Which layer filters the proxy firewall? CO4.12
21 CL1
a) Application b) Network c) Transport d) None of the above
Extensions were added in which version? CO4.13
22 CL1
a) 1 b) 2 c) 3 d) 4
Full form of TGS____?
a) Ticket Granting Service b) Ticket Guaranty Server
23 CO4.13 CL1
c)Transmission Granting Server d) Ticket Granting
Server
The subject unique identifier of the X.509 certificates was CO4.14
24 added in which version? CL2
a) 1 b) 2 c) 3 d) 4
Which of the following is not an element/field of the X.509
certificates?
25 CO4.14 CL1
a) Issuer Name b) Serial Modifier
c) Issuer unique Identifier d) Signature
X.509 defines alternative authentication protocols based on the
26 use of ___key certificates? CL2
a) Public b) Private c) Master d) None CO4.14
Which of the following is not an element/field of the X.509
certificates?
27 CO4.14 CL1
a) Issuer Name b) Serial Modifier
c) Issuer unique Identifier d) Signature
What's the purpose of the Bitcoin network?
28 a) p2p money transfer b) p2p private communication CL1
c)p2p Skype calling d) p2p crypto kitties CO4.15
Network in which every computer is capable of playing the role
of client, server or both at the same time is called_____?
29 CO4.15 CL1
a) peer-to-peer network b)local area network
c)dedicated server network d)wide area network
In peer-to-peer network, each computer in a network is referred CO4.15
as
30 CL1
____?
a) Server b) Client c) Peer d) Sender
PART –B
Deliberate how can an authentication system be designed
to meet the three essential requirements, ensuring both
top-level security and a user-friendly experience for CO4.1
accessing a system?
1 CL1
List out the various network communication
vulnerabilities that can be exploited by malicious attackers
to compromise data integrity and confidentiality? CO4.1
● Traffic analysis
● Masquerade
2 ● Sequence Modification CL2
● Disclosure
● Timing modification
● Source Repudiation
● Content Modification
● Destination repudiation
How does the expression of a MAC function's security
provide justification for its effectiveness in safeguarding
data integrity and authentication? CO4.3
✔ Variable input size
3 ✔ Fixed output size CL2
✔ Efficiency
✔ Pre image resistant(one-way property)
✔ Second pre image resistant(weak Collision resistant)
✔ Collision Resistant(Strong Collision Resistant)
✔ Pseudo randomness
Narrate the key properties that make digital signatures a
reliable and secure method for ensuring data authenticity
and non-repudiation? CO4.7
4 CL1
Portray how do digital signatures enhance security and CO4.7
what services do they provide to protect digital
information?
● Signer authentication. Proof of who actually signed the
5 document i.e. digital signatures linking the user's CL1
signature to an actual identifiable entity.
● Data integrity. Proof that the document has not been
changed since signing.
Non-repudiation.
To specify the requirements should a digital signature CO4.7
scheme should satisfy?
The signature must be bit pattern that depends on the message
being signed.
∙The signature must use some information unique to the
sender, to prevent both forgery and denial.
6 CL2
∙It must be relatively easy to produce the digital signature.
∙It must be relatively easy to recognize and verify the digital
signature
It must be practical to retain a copy of the digital signature in
storage
Reveal what is the systematic sequence of actions and
processes encompassed in the Secure Electronic
Transaction (SET) protocol, ensuring robust and secure CO4.8
online payment transactions in an interconnected world?
The customer opens an account
The customer receives a certificate
Merchants have their own certificate
7 CL1
The customer places an order.
The merchant is verified.
The order and payment are sent.
The merchant requests payment authorization.
The merchant confirms the order.
The merchant provides the goods or services.
The merchant requests payment.
In the realm of Kerberos, how would you define and
illustrate the concept of a "realm," shedding light on its
significance in facilitating secure authentication and access CO4.13
control within distributed systems?
✔ AfullserviceKerberosenvironmentconsistingofa
8 Kerberosserver,ano.Ofclients,no. of application CL2
server requires the following
✔ TheKerberosservermusthaveuserIDandhashedp
asswordofallparticipatingusersin its database.
TheKerberosservermustshareasecretkeywitheachserver.Suchan
environmentisreferred to as “Realm”.
Assume a client C wants to communicate with a server S CO4.13
using Kerberos protocol. Explain How can it be achieved?
Kerberos is a network authentication protocol that is used to
provide secure communication between client machines and
servers. Here's how client machine C can use Kerberos to
communicate with server S:
1. Client C sends a request for a ticket to the Kerberos
Authentication Server (AS).
2. The AS checks the user's credentials (e.g. username and
9 password) and issues a ticket-granting ticket (TGT) to C. CL3
3. C sends the TGT to the Kerberos Ticket-Granting Server
(TGS) along with a request for a service ticket to access server
S.
4. The TGS verifies the TGT and issues a service ticket for
server S to C.
5. C sends the service ticket to S along with a message that
includes the authentication information.
6. S verifies the service ticket and grants access to C.
Narrate how can we craft an engaging and interactive
authentication dialogue, inspired by the principles of
Kerberos, that showcases the seamless exchange of secret CO4.13
keys and empowers users with the ability to access
multiple realms securely and effortlessly?
C= client, AS= authentication server, V=server
IDC= identifier of user on C, IDV= identifier of V
PC= password of user on C, ADC= network address of
10 C CL2
Kv= secret encryption key shared by AS and V
• AS creates a ticket that contains the user's ID and
network address and the server's ID.
• This ticket is encrypted using the secret key shared by
the AS and this server.
• This ticket is then sent back to C.
C sends a message to V containing C's ID and the ticket.
Design the role of Ticket Granting Server in inters realm CO4.13
operations of Kerberos?
• In Kerberos authentication, a Ticket Granting Ticket
(TGT) is a user authentication token issued by the Key
Distribution Center (KDC) that is used to request
access tokens from the Ticket Granting Service (TGS)
11 CL3
for specific resources/systems joined to the domain.
• Use of the TGT was designed into the Kerberos
protocol to avoid frequently asking the user for a
password – a password used by Kerberos to derive a
master key – or storing the master key on the
workstation.
Clarify how does the X.509 standard revolutionize the
digital landscape by establishing a robust framework for
secure communication and trust, and what key CO4.14
functionalities does it bring to the forefront in a world
increasingly reliant on digital identities and cryptographic
certificates?
The certificate is typically used to manage identity and
security in computer networking and over the internet. For the
internet, it is used in numerous protocols to ensure a malicious
website doesn't fool a web browser. The X. 509 certificate is
12 also used to secure email, device communications and digital CL2
signatures.
PART –C
Narrate how can the intricate web of network
communication vulnerabilities, susceptible to the cunning
1 exploits of malicious attackers, be unveiled and addressed CO4.1 CL2
to safeguard the sacred pillars of data integrity and
confidentiality in the digital realm?
(i)Where hash functions are used? What characteristics
are needed in secure hash function? Write about the
security of hash functions and MACs.
2 CO4.3 CL1
(ii)Discuss the classification of authentication function in
detail.
(i)Enumerate the properties of Hash Function.
3 (ii)Evaluate the authentication protocol and list its CO4.4 CL2
limitations, how the limitations overcome.
With a neat diagram, explain the steps involved in SHA
algorithm for encrypting a message with maximum length
4 of less than 2128 bits and produces as output a 512-bit CO4.5 CL3
message digest.
Portray about Digital Signature? And discuss how it is CO4.7
5 created at the sender end and retrieved at receiver end? CL2
Differentiate digital signature from digital certificate.
Illustrate the steps involved in Signature generation and CO4.8
6 Verification functions of DSS? CL2
Discuss the roles of the different servers in Kerberos CO4.13
7 protocol. How does the user get authenticated to the CL2
different servers?
In the enchanting realm of secure communication, how do
the architectural marvels of Kerberos and X.509
certification mechanisms entwine, painting a vivid tapestry CO4.14
8 that unravels the essence of their designs, captivatingly CL3
safeguarding our digital interactions with an aura of trust
and cryptographic elegance?
(i)How does Kerberos version 4 transcend its limitations
amidst environmental constraints and technical gaps,
crafting a compelling narrative of innovative solutions that
breathe new life into the realm of secure digital identity
management?
9 (ii) In the mystical realm of Kerberos, how does the CL3
alchemy of encryption unfold, revealing the secrets of how CO4.14
a simple password metamorphoses into a powerful
cryptographic key, empowering users with the ability to
unlock a realm of secure authentication and
communication with a touch of enchantment?
UNIT -5
UNIT- 5 SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security, PGP, S/MIME, IP security, Web Security, SYSTEM SECURITY:
Intruders, Malicious software, viruses, Firewalls, Network Anomaly Detection and Routing
Security.
PART - A
S.NO Q&A CO COGNI
LEVEL TIVE
LEVEL
PGP stand for___________
1 a) Permuted Gap Permission
b) Permuted Great Privacy CO5.1 CL1
c) Pretty Good Privacy
d) None of the mentioned
2 PGP makes use of ___________ cryptographic algorithm.
a) DES
b) AES CO5.1 CL1
c) RSA
d) Rabin
3 Direct Action Virus is also known as ___________
a) Non-resident virus
b) Boot Sector Virus CO5.1 CL1
c) Polymorphic Virus
d) Multipartite Virus
4 S/MIME provide___________ functions.
a) Enveloped data
b) Signed data CO5.1 CL1
c)Both A & B
d) Unsigned data
5 IPsec operates in mode.
a) Transport mode
b) tunnel mode CO5.2 CL1
c) Both A&B
d) none
6 _______is a malicious program.
a) Spyware
b) viruses CO5.2 CL1
c) Trojans
d) Logic Bombs
7 __ is the method for keeping sensitive information in email
communication & accounts secure against unofficial access,
loss, or compromise.
a) Email security CO5.2 CL1
b) Email hacking
c) Email protection
d) Email safeguarding
8 The stored cookie which contains all your personal data about
that website can be stolen away by __ using ____or Trojans. CO5.2 CL1
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus
9 ___is the technique used for tricking users to disclose their
username and passwords through fake pages.
a) Social Engineering
CO5.3 CL1
b) Phishing
c) Cookie Stealing
d) Banner Grabbing
10 Find out the error (if any) in the following representation –
111.56.045.78?
a) There should be no leading zeros
CO5.3 CL2
b) We cannot have more than 4 bytes in an IPv4 address
c) Each byte should be less than or equal to 255
d) No error
11 Full form of TGS is ____.
a) Ticket Granting Service
b) Ticket Guaranty Server CO5.3 CL1
c)Transmission Granting Server
d) Ticket Granting Server
12 Which one of the following is required to find the session key in
a secure communication channel?
a) public key of the server
CO5.4 CL1
b) Username of the client
c) IP address of the router
d) Encryption algorithm used for data transmission
13 ___________ is used for electronic funds transfer and point of
sale applications?
a) Data-encrypting key
CO5.4 CL1
b) File-encrypting key
c) PIN-encrypting key
d) None of the mentioned
14 Which one of the following is not an element/field of the X.509
certificates?
a) Issuer Name
CO5.4 CL1
b) Serial Modifier
c) Issuer unique Identifier
d) Signature
15
In the above figure from left to right, the correct order of the
shaded levels is CO5.5 CL2
a) Network level, Application level, Transport level
b) Application level, Network level, Transport level
c) Transport level, Application level, Network level
d) Network level, Transport level, Application level
16
In the above figure, which of the above shaded block is
transparent to end users and applications? CO5.5 CL2
a) IP/IPsec
b) SSL
c) Kerberos
d) S/MIME
17 Which one of the following is not a higher layer SSL protocol?
a) Alert Protocol
b) Handshake Protocol CL1
CO5.5
c) Alarm Protocol
d) Change Cipher Spec Protocol
18 The full form of SSL is
a) Serial Session Layer
b) Secure Socket Layer CL1
CO5.6
c) Session Secure Layer
d) Series Socket Layer
19 How many bytes of padding need to be added to the system?
a) 1
b) 2 CO5.6 CL2
c) 3
d) 4
20 Which protocol consists of only 1 bit?
a) Alert Protocol
b) Handshake Protocol CO5.6 CL1
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
21 Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas CO5.6 CL1
c) Robert
d) Charles
22 ___________ is defined as an attempt to steal, spy, damage or
destroy computer systems, networks, or their associated
information.
a) Cyber-attack CO5.7 CL1
b) Computer security
c) Cryptography
d) Digital hacking
23 Cyber-attack represents ____________________.
a) Phishing
b) SQL Injections CO5.7 CL1
c) Password Attack
d) All the above
24 IT security in any firm or organization is maintained and
handled by ____________________. CO5.7 CL1
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
25 ___________ has now evolved to be one of the most popular
automated tools for unethical hacking.
a) Automated apps
CO5.7 CL1
b) Database software
c) Malware
d) Worms
26 It can be a software program or a hardware device that filters
all data packets coming through the internet, a network, etc. It
is known as the_______.
a) Antivirus CO5.7 CL1
b) Firewall
c)Cookies
d)Malware
27 Which one of the following is the hacking approach where
cyber-criminals design fake websites or pages for tricking or
gaining additional traffic?
a) Pharming CO5.8 CL1
b) Website-Duplication
c) Mimicking
d) Spamming
28 Which one of the following do Cyber attackers commonly
target for fetching IP address of a target or victim user?
a) IP tracker
CO5.8 CL1
b) emails
c) websites
d) web pages
29. ___________ is defined as an attempt to harm, damage or cause
threat to a system or network.
a) Digital crime
CO5.8 CL1
b) Threats
c) System hijacking
d) Cyber Attack
30. They are nefarious hackers, and their main motive is to gain
financial profit by doing cybercrimes. Who are “they” referred
to here?
a) White Hat Hackers CO5.8 CL1
b) Black Hat Hackers
c) Hacktivists
d) Gray Hat Hackers
PART - B
1 Provide any real-world examples of how organizations have
successfully utilized PGP to enhance their data security and CO5.1 CL2
protect sensitive communications?
Pretty Good Privacy (PGP) is a popular encryption software that
provides cryptographic privacy and authentication for data
communication. Numerous organizations have successfully utilized
PGP to enhance data security and protect sensitive
communications. Here are some real-world examples:
Email Encryption for Healthcare Organizations.
Financial Institutions and Secure Communications.
Government and Intelligence Agencies.
Legal Firms and Attorney-Client Privilege.
Journalists and Whistleblower Protection.
Journalists and Whistleblower Protection.
2 Characterize the relationship between MIME content types and
MIME transfer encodings, and how they work together to
facilitate successful data exchange?
The relationship between MIME (Multipurpose Internet Mail
Extensions) content types and MIME transfer encodings is essential
for facilitating successful data exchange in various internet
applications, especially in email communication and web protocols.
They work together to ensure that data is correctly interpreted,
transmitted, and received across different systems and platforms.
MIME Content Types:
MIME content types are labels that describe the nature and format
of data in a message or a file. Each MIME content type is
represented by a content type header, typically in the format
Content-Type: type/subtype. For example, a plain text email might
have the header
Content-Type: text/plain, indicating that the content is plain text.
CO5.2 CL2
MIME Transfer Encodings:
MIME transfer encodings are mechanisms used to transform the
raw data into a format suitable for transmission over the internet.
They encode the data to ensure it can be safely transmitted through
email or other protocols without being altered or corrupted.
Common MIME transfer encodings include:
Base64 encoding: Used to encode binary data into plain ASCII
characters, making it suitable for transmission through email or
other text-based protocols.
Quoted-printable encoding: Used to encode text containing special
characters to ensure it remains readable and intact during
transmission.
Working Together:
MIME content types and transfer encodings work together in the
following way:
● Data Identification.
● Data Encoding.
● Data Transmission
● Data Interpretation
3 If a lossless compression algorithm, such as ZIP, is used with
S/MIME.Is it preferable to generate a signature before
applying compression?
It is generally recommended to generate the signature before
applying compression. The reason for this preference is to ensure
the integrity of the signed content.
When you apply a digital signature to a message, the signature is
generated based on the content of the message itself. Any alteration
or modification to the content after the signature is applied will
invalidate the signature, indicating that the content has been
tampered with. Compression alters the data, even if it's a lossless CO5.2 CL1
compression, as it rearranges the data to reduce its size.
If compression is applied before generating the signature, the
signature will cover the compressed data, not the original data. Any
decompression and recompression process at the receiver's end can
lead to changes in the compressed data, causing the signature to fail
verification.
By generating the signature before applying compression, you
ensure that the signature covers the original, uncompressed content.
This way, after decompression, the signature can still be verified
against the original data, ensuring its integrity
4. The sequence number in ESP header in IPsec is used to prevent
replay attacks: The receiver will only accept one packet with
each sequence number, and reject a packet with a sequence
number that has already been used. What then prevents an
attacker from sending a packet with this sequence number
from being accepted?
In IPsec (Internet Protocol Security), the sequence number in the
ESP (Encapsulating Security Payload) header is indeed used to
prevent replay attacks.
To prevent such attacks, IPsec uses a mechanism called the
CO5.3 CL2
"anti-replay window." The anti-replay window is a range of
acceptable sequence numbers that the receiver will consider valid.
When the receiver receives a packet, it checks the sequence number
to see if it falls within the anti-replay window. If the sequence
number is within the acceptable range and hasn't been used before,
the packet is considered valid and processed.
If the sequence number is outside the anti-replay window or has
been used before (indicating a replayed packet), the packet is
discarded.
Here's how the anti-replay window works:
When the IPsec tunnel is established, the sender and receiver agree
on an initial sequence number.
As packets are sent, the sender increments the sequence number for
each new packet. The receiver keeps track of the expected sequence
number it should receive next.
The receiver maintains a sliding anti-replay window that defines a
range of acceptable sequence numbers. This window typically
covers a small range of sequence numbers, for example, 64 or 128
numbers.
The receiver compares the sequence number of each incoming
packet with the expected sequence number and checks if it falls
within the anti-replay window.
If the sequence number is within the window and has not been used
before, the receiver accepts the packet and updates its expected
sequence number to the next value in the window.
5. In large-scale enterprise networks with a wide range of devices
and operating systems, how does IP Security (IPsec) ensure
interoperability and compatibility among different systems,
while maintaining a high level of security for data
transmission?
IPsec (Internet Protocol Security) is designed to provide secure
communication over IP networks, Here's how IPsec achieves this
while maintaining a high level of security for data transmission:
Standardized Protocols: IPsec relies on standardized protocols
defined by the Internet Engineering Task Force (IETF). The two
main components of IPsec are Authentication Header (AH) and
Encapsulating Security Payload (ESP).
Negotiation of Security Parameters: Before establishing a secure
CO5.3 CL1
communication channel, IPsec peers negotiate security parameters
using the Internet Key Exchange (IKE) protocol.
Tunnel and Transport Mode: IPsec can operate in two modes:
tunnel mode and transport mode. Tunnel mode encrypts the entire
IP packet, including the original IP header, while transport mode
only encrypts the payload (data) of the IP packet.
NAT Traversal: Network Address Translation (NAT) is commonly
used in large-scale enterprise networks to conserve IP addresses.
However, NAT can interfere with IPsec's ability to establish secure
connections.
Vendor Support and Integration: Leading networking equipment
vendors and operating system providers offer built-in IPsec support
in their products.
6. Point out the main differences between transport mode and CO1.5 CL2
tunnel mode in IPsec, and how do they impact the way data is
Secured and transmitted.
7. Suppose you find some technical problems with the mail
account
[email protected]. Whom should you try to contact
in order to solve them?
RFC 822 ("Standard for Internet Text Messages") requires mailbox CO5.5 CL3
"postmaster" to be valid at each site, in order to contact a person
with responsibility for the general operation of the site. So, in this
case you should send an e-mail to
[email protected]8 In a corporate network environment, Company X has recently
implemented both Intrusion Detection Systems (IDS) and
firewalls to enhance their network security. Provide a case
study outlining the specific advantages of IDS over firewalls
and how these two security components complement each other
to strengthen the overall network security.
Company X is a multinational corporation operating in
various industries. They recently implemented both
Intrusion Detection Systems (IDS) and firewalls to
enhance their network security. The objective was to
fortify their infrastructure against potential cyber
threats, safeguard sensitive data, and ensure continuous
business operations. CO5.5 CL2
Advantages of IDS Over Firewalls
Detecting Anomalies and Intrusions.
Behaviour-Based Detection’s
Real-Time Monitoring.
Insider Threat Detection.
Complementing Each Other for Stronger Security.
Perimeter Defence.
Deep Packet Inspection.
Event Correlation.
Incident Response.
Comprehensive Security Analysis:
IDS and firewalls generate valuable security data and logs.
Centralized Security Information and Event Management (SIEM)
solutions can aggregate and analyse these logs holistically, enabling
a more effective understanding of the network's security posture.
9 Provide an overview of the various firewall types and their
specific objectives in safeguarding networks from potential
threats and unauthorized access.
Packet Filtering Firewall:
Packet filtering firewalls analyzepacket header information, such as
source and destination IP addresses, ports, and protocol types.
Stateful Inspection Firewall:
This approach provides better security by preventing certain types
of attacks, such as IP spoofing and session hijacking.
Proxy Firewall:
Proxy firewalls act as intermediaries between the internal network
and external networks. They receive requests from internal clients
and initiate connections on their behalf to external servers.
Next-Generation Firewall (NGFW):
NGFWs combine traditional firewall functionalities with advanced CO5.7 CL2
security features, such as deep packet inspection, intrusion
prevention systems (IPS), application awareness, and user
identification.
Application Firewall:
Application firewalls, also known as web application firewalls
(WAF), focus on securing specific web applications.
Network Address Translation (NAT) Firewall:
This provides a degree of protection by obscuring the internal
network's structure.
Virtual Firewalls:
Virtual firewalls operate within virtualized environments and cloud
infrastructures. They provide security for virtual machines (VMs)
and microservices within the virtual network, ensuring that network
traffic between virtualized resources is controlled and protected.
10 Emphasize the significance of integrating firewalls
harmoniously with supplementary security measures to fortify
CO5.7 CL3
the overall defence strategy for safeguarding networks and
data.
Firewalls serve as the first line of defence in network security, but
they are most effective when complemented by additional security
measures that address different layers and aspects of cybersecurity.
Here's why the integration is significant:
Defence in Depth: Firewalls, along with other security tools such
as intrusion detection/prevention systems (IDS/IPS), antivirus
software, encryption, and access controls, work together to create
multiple layers of protection. If one layer is breached, the others
can still thwart the attack, reducing the risk of a successful
compromise.
Addressing Different Threat Vectors: Different security measures
are designed to address specific threat vectors. Firewalls are
effective at filtering and controlling network traffic, while other
tools focus on malware detection, data encryption, user
authentication, and monitoring
Reducing Single Points of Failure: Relying solely on firewalls for
network security creates a single point of failure. If an attacker
finds a way to bypass the firewall, the entire network becomes
vulnerable.
Granular Control: Firewalls are excellent at controlling traffic
based on IP addresses, ports, and protocols. When integrated with
other tools like application firewalls and access controls, the
organization gains granular control over who accesses what data
and from where, adding an extra layer of protection against
unauthorized access.
Threat Intelligence Sharing: Integrating security tools facilitates
the exchange of threat intelligence between different components.
Improved Visibility and Analytics: The integration of security
tools often comes with centralized management and reporting
systems. This provides security teams with better visibility into the
network's security posture and allows them to analyse patterns and
trends in cybersecurity events.
11 Enumerate the primary design goals of firewalls in preserving
network security and defending against potential threats and
unauthorized access. Elaborate on how these design goals
collectively contribute to safeguarding the integrity,
confidentiality, and availability of sensitive information within
an organization's network.
Primary Design Goals of Firewalls in Preserving Network Security: CO5.7 CL2
Traffic Control and Filtering: Firewalls are designed to control
incoming and outgoing network traffic based on predefined rules.
Perimeter Defence: Firewalls act as the first line of defence at the
network perimeter. They create a protective barrier between the
internal network and the external world, shielding sensitive data
and resources from external threats and malicious actors.
12 Suppose you need to send one message to three different users:
[email protected],
[email protected], and
[email protected]. Is there any difference between sending
one separate message per user and sending only one message
with multiple (three) recipients? Explain.
If a separate message is sent for each of the users, one MAIL, one
CO5.8 CL3
RCPT and one DATA command will be issued for each of the
messages, resulting in the transmission of three copies of the
message data. If only one message with multiple recipients (three)
is sent, one MAIL, multiple RCPT and one DATA command will
be issued, resulting in the transmission of only one copy of the
message data
PART – C
Describe how does PGP handle key management, and what
cryptographic functions are involved in generating, storing,
1 and exchanging public and private keys securely? A block CO5.1 CL2
diagram depicting the key management process would aid in
comprehension.
Paraphrase the architecture of IPsec, including its main
components and their functionalities? If possible, illustrate the
2 CO5.3 CL2
relationships between these components using a neat block
diagram.
Consider the following threats to Web security and describe
how each is countered by a particular feature of TLS.
(i). Brute-Force Cryptanalytic Attack: An exhaustive search of
the key space for a conventional encryption algorithm. (3M)
(ii). Known Plaintext Dictionary Attack: Many messages will
contain predictable plaintext, such as the HTTP GET
command. An attacker constructs a dictionary containing every
possible encryption of the known-plaintext message. When an
encrypted message is intercepted, the attacker takes the portion
3 CO5.4 CL4
containing the encrypted known plaintext and looks up the
ciphertext in the dictionary. The ciphertext should match
against an entry that was encrypted with the same secret key. If
there are several matches, each of these can be tried against the
full ciphertext to determine
the right one. This attack is especially effective against small
key sizes (e.g., 40-bit keys). (3M)
(iii) Man-in-the-Middle Attack: An attacker interposes during
key exchange, acting as the client to the server and as the
server to the client. (3M)
Creating a diagram of the IP security architecture featuring the
Authentication Header (AH) can be intricate. Can you
elucidate on AH's significance in protecting against
4 CO5.4 CL2
unauthorized access and data tampering in IP
communications? Describe the functions of the AH fields in a
way that demonstrates their criticality in the security process.
Generalize the role of intrusion detection system? Point out the
5 three benefits that can be provided by the intrusion detection CO5.5 CL2
system?
Design a neat diagram demonstrating a stateful inspection
firewall architecture and show how the firewall tracks and
6 CO5.6 CL3
manages the state of active connections, and how it uses this
information to make filtering decisions.
Analyse the challenges and limitations that firewalls may
encounter while being a part of an organization's security
7 CO5.7 CL4
framework, and propose potential strategies to address these
shortcomings effectively.
Examine the behaviour and mode of transmission of a worm
virus, and identify a network scenario where this
8 CO5.7 CL2
self-replicating malware could rapidly spread and overwhelm
the entire network infrastructure.
Propose measures to strengthen the SET protocol's security
and mitigate the identified risks. Discuss the implementation of
9 CO5.8 CL3
cryptographic techniques, authentication mechanisms, and
secure communication channels.