Professional Documents
Culture Documents
If you have to both encrypt and compress data during transmission, which would you do
first, and why?
Due to having only one key, it is relatively easier to crack the symmetric encryption. In
asymmetric cryptography, even if one key is compromised, another key is required to decry-
pt the data and hence it is harder to crack the encryption.
In assymetric encryption the private key cannot be reconstructed from the public key. The
idea of asymmetric algorithms was first published by Diffie and Hellmann in 1978.
Transport Layer Security (TLS) and Pretty Good Privacy (PGP) protocols are comprehensively
utilized and brings out by the asymmetric cryptography. Ideally, they seem to be well suited
for the real-world use. The risk of getting known is much less as the private key does not
have to be shared. Every user only required to keep one private key in secrecy and a group
of public keys that only required to be protected against being altered.
The popular symmetric cryptographic algorithms include, AES, Blowfish, RC5, DES, 3DES and
IDEA.
To encrypt the data, the sender uses this key and an encryption algorithm and likewise, to
decrypt the data, receiver uses the same key and decryption algorithm correspondingly. This
key required to be kept secret to provide privacy. It is not secure any more once someone
else gets to know the key. Also it is not preferred to use symmetric encryption method
where it uses a public network for sharing the key. The chance for malicious insertion and
modification is higher in symmetric key cryptographic techniques.
1. What is DES ?
Answer =
DES
Block cipher
symmetric cipher same key for encryption and decryption
64 bit plaintext block
It encrypts the data in blocks of 64 bit size using 56 bit key
16no of rounds each round is a fiestel round
Strength of DES
56 bit have 2^56 = 7.2 * 10^16 values
brute force search looks hard
still must be able to recognize plaintext
sevral analytics attack on des - statistical attacks
STEPS
initial permutation
16 fiestel rounds
swapping left right swap
final permutation / inverse intial permutation
1. When a combination of symmetric encryption and an error control code is used for
message authentication, in what order must the two functions be performed ?
Answer – Error control code then encryption
1. What is a firewall.?
Answer - A firewall is a type of cybersecurity tool that is used to filter traffic on a
network. ... The primary goal of a firewall is to block malicious traffic requests
and data packets while allowing legitimate traffic through.
It acts as a shield to protect your system from the untrusted, non-reliable systems
connected to the internet.
In technical terms firewall is a piece of software hardware or both that allows only
selected packet to pass from the internet to your private system.
Firewall is installed on a standalone system that may or may not be networked
i.e. it usually connects to an ISP.
a. Packet filter
b. Application Gateway
a. Packet filter:
A packet filter applies a set of rules to each packet & based on the outcome,
divides to either forward or discard the packet. It is also called as screening
router or screening filter.
It receives each packet & check with the rule.
Suppose the rule is block all the packets then the firewall will block all the
packets to enter the internal system.
b. Application Gateway :
Application gateway is also called as 'proxy server', this is because it acts like a
proxy & decide about the flow of application level traffic.
9. Differentiate the different types of attacks on data during transmission.
Answer -
3. What are the major vulnerabilities that a computer system is subjected to?
Bugs.
Weak passwords.
Software that is already infected with virus.
Missing data encryption.
OS command injection.
SQL injection.
Buffer overflow.
Missing authorization.
5. What are the 3 independent dimensions on which all cryptographic systems are
characterized?
Ans – Characterize cryptographic system by:
Type of encryption operations used
• Substitution / transposition / product
Number of keys used
• Single-key or private / two-key or public
Way in which plaintext is processed
• Block / stream
Computationally secure = The encryption algorithm has been proven through mathematical
analysis to resist any “shortcuts” which allow recovery of plain text from the cipher text.
Unconditional depends typically on the life of the secret. If the secret must be preserved for
50 years, then unconditional security will give at least 50 years of protect from cracking.
13. How can you provide authentication to your messages using public key cryptography?
Ans – Authentication is provided by taking a piece of text, encrypting it using the
private key which is only known by you. If it can be decrypted using your public key,
then it is known to be encrypted by you. This then functions to authenticate the text.
In this way, a recipient with the sender's public key can verify that it was indeed
the sender who originated the message. This is called a digital
signature. Public-key encryption thus provides for both confidentiality
and authentication. The benefits of public-key encryption are clear.
14. How can you provide both secrecy and authentication to your messages using public key
cryptography?
Ans – The public key is used to encrypt the data and private key is used to
decrypt when the message confidentiality has to be
maintained. Authentication can be provided by using the PKC system and RSA
algorithm (RFC 3447). The message is encrypted using the private key of
the sender to authenticate the sender. Public-key encryption thus provides
for both confidentiality and authentication. The benefits of public-
key encryption are clear. The sender and recipient no longer need to
communicate previously, nor do they need to exchange private keys to send a
communication that is signed and secure.
17. What is the difference between direct and arbitrated digital signature.
Ans –
The Direct Digital Signature is only include two parties one to send
message and other one to receive it. According to direct digital signature
both parties trust each other and knows there public key. The message
are prone to get corrupted and the sender can declines about the
message sent by him any time. The Arbitrated Digital
Signature includes three parties in which one is sender, second is
receiver and the third is arbiter who will become the medium for sending
and receiving message between them. The message are less prone to
get corrupted because of timestamp being included by default.
19. What are the two common techniques used to protect a password file?
Ans – hashed passwords as well as a salt value or password file access
control.
# One way function:
The system stores only the value of the function based on the
user's password. When the user presents a password, the system transforms
that password and compares it with the stored value. In practice, the system
usually performs a one way transformation .its means not reversible in which
the
password is used to generate a key for the one way function and in which a
fixed length output is the produced.
# Access control:
The Access to the password file is limited to one or a very few
accounts.
2. DES Algo
Ans - Block cipher
symmetric cipher same key for encryption and decryption
64 bit plaintext block
It encrypts the data in blocks of 64 bit size using 56 bit key
16no of rounds each round is a fiestel round
Strength of DES
56 bit have 2^56 = 7.2 * 10^16 values
brute force search looks hard
still must be able to recognize plaintext
sevral analytics attack on des - statistical attacks
STEPS
initial permutation
16 fiestel rounds
swapping left right swap
final permutation / inverse intial permutation
Elgamal
Ans -
What is confidentiality
How to achieve confidentiality
How 3rd party is useful in transaction of message
Port no of https
Passive attack active attack
Draw any transposition technique
What is digital signature
x.509 certificate format
key distribution technique format
with kdc phases how to share secret key
what is cyber crime
he use of a computer as an instrument to further illegal ends, such as committing
fraud, trafficking in child pornography and intellectual property, stealing identities, or
violating privacy.
what is patent copyright
Copyrights protect “original works of authorship,” such as writings, art,
architecture, and music. Copyright secures Creative or intellectual
creations. Trademarks secure the branding under which products and services
are sold. Patent secures inventions that are useful for the world and has some
use
explain about DES
explain about HMAC
how to attain integrity confidentiality authenticity
explain RSA Elgamal
what is ssh
hash value – fixed or variable value
what is message digest