2 Marks For All Units
2 Marks For All Units
2 Marks For All Units
OBJECTIVES
To understand Cryptography Theories, Algorithms and Systems.
To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and
mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.
TEXTBOOK
William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition,
2006.
UNIT I – INTRODUCTION
PART-A
1. What is cryptography?(Remember)
An original message in a communication is known as the plaintext, while the coded message is
called the cipher text. The process of converting from plaintext to cipher text is known as
enciphering or encryption. The process of restoring the plaintext from the cipher text is
deciphering or decryption. The many schemes used for encryption constitute the area of study
known as cryptography.
2. Define security attack and mechanism?(Remember)
A security attack is defined as an action that compromises the security of information owned by
an organization. A Security mechanism is a process that is designed to detect, prevent, and recover
from a security attack.
3. What is meant by passive and active attack?(Nov/Dec 2017)(Remember)
Passive attacks are in the nature of eavesdropping, or monitoring of transmissions. The types of
passive attack include the release of message content and traffic analysis. Active attacks involve
some modification of data stream or creation of a false stream. The types of active attack includes
masquerade, Replay, Modification, Denial of service.
4. What are the various security services?(Remember)
Access control
Data confidentiality
Data Integrity
Non Repudiation
Authentication
5. How does simple columnar transposition work?(Remember)
This works by writing the message in a rectangle, row by row and read the message off, column
by column, but permutes the order of the columns. The order of the columns then becomes the
key to the algorithm.
6. What is meant by Steganography?(Remember)
A plaintext message may be hidden in one of two ways. The methods of steganography conceal
the existence of the message, whereas the methods of cryptography render the message
unintelligible to outsiders by various transformations of the text.
7. What are the types of attacks?(Remember)
Ciphertext Only
Known Plaintext
Chosen Plaintext
Chosen Ciphertext
Chosen Text
8. What is meant by Brute force attack?(Remember)
A brute-force attack involves trying every possible key until an intelligible translation of the
cipher text into plaintext is obtained. On average, half of all possible keys must be tried to achieve
success. That is, if there are X different keys, on average an attacker would discover the actual key
after X>2 tries.
ii) Transposition technique – it is one which performs some sort of permutation on the plaintext
letters. * Eg: DES, AES
20. Define Diffusion and confusion. (Remember)
Diffusion - It means each plaintext digits affect the value of many cipher text digits which is
equivalent to each cipher text digit is affected by many plaintext digits. It can be achieved by
performing permutation on the data. It is the relationship between the plaintext and cipher text.
Confusion - It can be achieved by substitution algorithm. It is the relationship between cipher text
and key.
21. Compare passive and active attack.(NOV/DEC 2016) (APR/MAY 2019) (Remember)
Passive attack Active attacks
A passive attack involves someone listening Active attacks on computers involve using
in on telecommunications exchanges or information gathered during a passive attack,
passively recording computer activity such as user IDs and passwords.
22. Why is asymmetric cryptography bad for huge data? Specify the reason. (Remember)
(APRIL/MAY 18)
1. Size of cryptogram: Symmetric encryption does not increase the size of the cryptogram
(asymptotically), but asymmetric encryption does.
2. Performance: On a modern CPU with hardware AES support, encryption or decryption
speed is over 2000 megabyte/second (per core).
23. Distinguish between attack and threat. (Understand) (NOV/DEC 18)
Threat: object, person, or other entity representing a constant danger to an asset
Attack: a deliberate act that exploits vulnerability
24. Calculate the cipher text for the following using one time pad cipher.
Plain text: ROCK & Keyword: BOTS. (Apply) (NOV/DEC 18)
Plain text: R(17) O(14) C(2) K(10)
Keyword: B(1) O(14) T(19) S(18)
Plaintext + Keyword: 18 28 21 28
Plaintext + Keyword mod 26: 18 2 21 2
Cipher text: S C V C
25. What is Modern cryptography? (Remember)
Modern Cryptography is the cornerstone of computer and communications security. Its
foundation is based on various concepts of mathematics such as number theory, computational-
complexity theory, and probability theory.
26. What are the characteristics of Modern Cryptography? (Understand)
Classic Cryptography Modern Cryptography
It manipulates traditional characters, i.e., letters It operates on binary bit sequences.
and digits directly.
O E O O R W
2. Using playfair cipher algorithm encrypt the message using the key “MONARCHY “and
explain? .(Understand)
3. What is steganography? Describe the various techniques used in steganography. (APR/MAY
2019) (Remember)
4. What is monoalphabetic cipher/Examine how it differs from Cesar cipher. (APR/MAY 2019)
(Remember)
5. Explain the Cesar cipher and monoalphabetic cipher? .(Understand)
6. What are the different types of attacks? Explain? (Remember)
7. Explain the substitution encryption techniques in detail? (Remember)
8. Describe the classical cryptosystems and its types? (Remember)
9. Explain the OSI security architecture with an example?(NOV/DEC 2016) (APR/MAY 2019)
(Remember)
10. Describe the various security mechanisms. (NOV/DEC 2016) (Remember)
11. Encrypt the following using play fair cipher using the keyword MONARCIIY.
"SWARAJ IS MY BIRTH RIGHT'. Use X for blank spaces(NOV/DEC 2017)
(Understand)
12. Explain public key cryptography and when it is preferred? .(APR/MAY 2019)
13. Explain classical encryption techniques with symmetric cipher and Hill cipher model.
(Understand) (APRIL/MAY 18)
14. Describe (i) Playfair cipher (ii) Railfence cipher (iii)Vignere cipher (APR/MAY
2017) (Remember)
15. Perform Encryption & decryption using Hill Cipher for the following. Message PEN and
Key: ACTIVATED (Understand) (NOV/DEC 18)
16. Elaborate on the following topics (Remember)
i) Perfect Security
ii) Information Theory
iii) Product Cryptosystem
17. Write a note on different types of Security Attacks and Services in Detail (Remember)
(NOV/DEC 19)
PART-C
1. Using the positional value of alphabets represent them in 5 bit binary. Apply the transformation
c1 = ki ⊕ Pi , pi = ci⊕ki where pi = “scheme”,ki = Cipher. Find the cipher text. (Evaluate)
2. Applying Caesar Cipher and k=5 decrypt the given Cipher Text
“YMJTYMJWXNIJTKXNQJSHJ”.
3. Applying Vigenere Cipher, encrypt the word “explanation” using the key “leg”.
ASSIGNMENT - 1
1. Using playfair cipher algorithm encrypt the message “HIDE THE GOLD” using the key
“EXAMPLE “and explain? (Understand)
2. Using playfair cipher algorithm encrypt the message “ Semester result” using the key
“Examination “and discuss the rules to be followed.(APR/MAY 2019) (Understand)
2. The sender and receiver must share The 2. The sender and receiver must each have one
algorithm and the key of the Matched pair of keys
3. The key must be secret 3. One of two keys must be kept Secret
5. Knowledge of the algorithm plus samples of 5. Knowledge of the algorithm plus one of key
cipher text must insufficient to determine the plus samples of cipher text must be insufficient
key to determine the other key.
public-key authority. Each certificate contains a public key and other information, is created by a
certificate authority, and is given to a participant with the matching private key.
10. Find gcd (1970, 1066) using Euclid’s algorithm? (Apr/May 17 & NOV/DEC 2016)
(Remember)
gcd (1970,1066) = gcd (1066,1970 mod 1066) = gcd (1066,904) = 2
11. What is the primitive root of a number? (Remember)
We can define a primitive root of a number p as one whose powers generate all the integers from
1 to p-1. That is p, if a is a primitive root of the prime number p then the numbers.
12. Plan on number of keys that are required by two people to communication via a cipher
(Understand)
For Symmetric Single key is used to encrypt and decrypt while communicating via cipher while
in asymmetric two key are used, one for encryption and one for decryption. So in symmetric
sender and receiver uses same keys while in asymmetric sender uses one while receiver uses
different to decrypt the cipher text.
13. Solve 117 mod 13. (Evaluate)
Split the power, 112 mod 13 = 121 mod 13 = 4
114 mod 13 = 112 mod 13 x 112 mod 13 = 4 x 4 mod 13 = 3
117 mod 13 = (111 x 112 x 114) mod 13 = 132 mod 13 = 2.
7
Therefore, 11 mod 13 = 2.
14. What are the modes of DES? (NOV/DEC 2013) (Remember)
Four modes, called the Electronic Codebook (ECB) mode, the Cipher Block Chaining
(CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode.
15. List the uses of RC4. (NOV/DEC 2013) (Remember)
RC4 is used in
1. Secure Sockets Layer/Transport Layer Security (SSL/TLS)standards,
2. Wired Equivalent Privacy(WEP) protocol,
3. WiFi Protected Access (WPA) Protocol
16. What is optimal Asymmetric Encryption Padding? (MAY/JUNE 2014) (Remember)
In cryptography, Optimal Asymmetric Encryption Padding (OAEP) is a padding scheme
often used together with RSA encryption.
17. What are the disadvantages of double DES? (NOV/DEC 2012)
Meet-in-the-middle attack is possible in triple DES. (Remember)
Need more memory space for encryption and decryption.
18. State few applications of RC4 algorithm. (APR/MAY 2015) (Remember)
Secure Sockets Layer/Transport Layer Security (SSL/TLS)standards,
Wired Equivalent Privacy(WEP) protocol,
WiFi Protected Access (WPA) Protocol
19. Is it possible to use the DES algorithm to generate message authentication code? Justify.
(NOV/DEC 2014) (Analysis)
Data Authentication Algorithm (DAA) is a widely used MAC based on DES-CBC
using IV=0 and zero-pad of final block encrypt message using DES in CBC mode and send
just the final block as the MAC or the leftmost M bits (16_M_64) of final block but final
MAC is now too small for security.
20. State whether symmetric and asymmetric cryptographic algorithms need key exchange.
(MAY/JUNE 2014) (Analysis)
Key exchange is any method in cryptography by which cryptographic keys are exchanged
between two parties, allowing use of a cryptographic algorithm. If sender and receiver wish to
exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt
messages received. The nature of the equipping they require depends on the encryption technique
they might use. If they use a code, both will require a copy of the same codebook. If they use a
cipher, they will need appropriate keys. If the cipher is a symmetric key cipher, both will need a
copy of the same key.
21. Brief the strength of Triple DES. (NOV/DEC 2016) (Remember)
Three 64-bit keys are used, instead of one, for an overall key length of 192 bits (the first
encryption is encrypted with second key, and the resulting cipher text is again encrypted with a
third key).
22. Give the significance of hierarchical key control. (NOV/DEC 2017) (Remember)
There can be local KDC responsible for small domain in the large networks. When
the two principals are in the same domain the local KDC does the key distribution. When the
two principals are in different domain, the local KDC communicates to the global KDC. The key
selection can be done by anyone KDC. The numbers of layers depend upon the network size.
23. List the parameters (block size, key size and no of rounds) for the three AES versions.
(Remember)
(APRIL/MAY 18)
Key size 4/16/128 6/24/192 8/32/256
Plaintext block size 4/16/128 4/16/128 4/16/128
Number of rounds 10 12 14
Round key size 4/16/128 4/16/128 4/16/128
24. Give the five modes of operations in block cipher.(Apr/May 2017) (Remember)
i) Electronic Codebook(ECB) Mode, ii) CBC (Cipher-Block Chaining) Mode,
iii) CFB (Cipher Feedback) Mode, iv) OFB (Output Feedback) Mode,
v) CTR (Counter) Mode.
25. Compare DES and AES. (Remember) (NOV/DEC 18)
26. Why is trap door one way function used? (Remember) (NOV/DEC 18)
A trapdoor one-way function is a function that is easy to compute in one direction, yet believed to
be difficult to compute in the opposite direction (finding its inverse) without special information,
called the ‘trapdoor”. Trapdoor functions are widely used in cryptography.
27. Why the middle portion of triple DES is a decryption rather than encryption?
(Understand)
There is no cryptographic significance to the use of decryption for the second stage. Its only
advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single
DES by repeating the key.
28. Why do some block cipher modes of operation only use encryption while others use both
encryption and decryption? (Understand)
In some modes, the plaintext does not pass through the encryption functions, but is XORed with
the output of the encryption function. The math works out that for decryption in these cases, the
encryption function must also be used.
29. When is encryption scheme unconditionally and computationally secure? (Understand)
An encryption scheme is unconditionally secure if the ciphertext generated by the scheme does
not contain enough information to determine uniquely the corresponding plaintext, no matter how
much ciphertext is available. An encryption scheme is said to be computationally secure if
The cost of breaking the cipher exceeds the value of the encrypted information, and
The time required to break the cipher exceeds the useful lifetime of the information.
30. If a bit error occurs in the transmission of a ciphertext character in 8-bit CFB mode,
how far does the error propagate? (Understand)
Nine plaintext characters are affected. The plaintext character corresponding to the ciphertext
character is obviously altered. In addition, the altered ciphertext character enters the shift register
and is not removed until the next eight characters are processed.
31. Why a large quantity of random keys is undesirable? (Understand)
There is the practical problem of making large quantities of random keys.
Any heavily used system might require millions of random characters on a regular basis.
Supplying truly random characters in this volume is significant task.
Even more daunting is the problem of key distribution and protection. For every message
to be sent, a key of equal is needed by both sender and receiver. Thus, a mammoth key
distribution problem exists.
32. What are the requirements needed for secure use of Conventional Encryption.
(Understand)
(i). A strong encryption algorithm is needed. It is desirable that the algorithm should be in such a
way that, even the attacker who knows the algorithm and has access to one or more cipher texts
would be unable to decipher the ciphertext or figure out the key.
(ii).The secret key must be distributed among the sender and receiver in a much secured way. If in
any way the key is discovered and with the knowledge of algorithm, all communication using this
key is readable.
33. List out the parameters of AES (NOV/DEC 2011) (Understand)
The parameters of AES includes
Key size(words/bytes/bits)
Plaintext Block size(words/bytes/bits)
Number of rounds
Round key size(words/bytes/bits)
Expanded key size(words/bytes)
35. Briefly define a Group, a Ring and a Field. (Remember) [NOV/DEC 19]
A Group is a set of elements that is closed under a binary operation and that is associative and
that includes an identity element and an inverse element.
A Ring is a set of elements that is closed under two binary operations, addition and multiplication,
with the following: the addition operation is a group that is commutative; the multiplication
operation is associative and is distributive over the addition operation.
A Field is a ring in which the multiplication operation is commutative, has no zero divisors and
includes an identity element and an inverse element.
36. Does the set of residue classes modulo 3 forms a group. (Analyze) [NOV/DEC 19]
(a) with respect to addition?
(b) with respect to multiplication?
Here are the addition and multiplication tables
+ 0 1 2 x 0 1 2
0 0 1 2 0 0 0 0
1 1 2 0 1 0 1 2
2 2 0 1 2 2 0 1
(a) Yes. The Identity element is 0, and the inverses of 0, 1, 2 are respectively 0, 2, 1.
(b) No. The Identity element is 1, but 0 has no inverse.
37. Prove that [(a mod n) - (b mod n)] mod n = (a - b) mod n. (Evaluate)
Let c = a mod n and d = b mod n. Then
c = a + kn; d = b + mn; c - d = (a - b) + (k - m) n
Therefore (c - d) = (a - b) mod n.
38. List the entities that are to be kept secret in conventional encryption techniques
(Understand) (NOV/DEC 19)
Plaintext
The type of operations used for performing plaintext to ciphertext (Encryption Algorithm)
The number of keys used. (Key Generator)
The way in which plaintext is processed.
Decryption Algorithm
PART – B
1. Write down Triple DES algorithm and explain with neat diagram. (NOV/DEC 2013)/
(MAY/JUNE 2013) (APR/MAY 2019) (Remember)
2. Describe the working principles of simple DES with an example.(MAY/JUNE 2014)/
(APR/MAY 2015) (Understand)
3. Briefly explain Diffie-Hellman Key Exchange. (MAY/JUNE 2014)/ (NOV/DEC 2012)
(APR/MAY 2017) (Understand)
4. Discuss in detail the encryption and decryption process of AES. (NOV/DEC 2016)
(Understand)
5. Brief out the encryption and decryption process of DES and depict the general structure. List
out the strength and weakness of the same. (NOV/DEC 2014) (Understand)
6. What do you mean by AES? Diagrammatically illustrate the structure of AES and describe the
steps in AES encryption process with example. (APRIL/MAY 18) (Understand)
7. Describe DES algorithm and explain with neat diagram and explain the steps.(APR/MAY
2017) (Understand)
8. Describe in detail the key generation in AES algorithm and its expansion format. (APR/MAY
2019) (Understand)
9. Discuss the properties that are to be satisfied by Groups, Rings and Fields. (NOV/DEC
2017) (Create)
10. Explain in detail about the entities in the symmetric cipher model with their requirements for
secure usage of the model. (Remember) [NOV/DEC 19]
11. Demonstrate that the set of polynomials whose coefficients form a field is a ring.
(Understand) [NOV/DEC 19]
PART-C
1. For each of the following elements of DES, indicate the comparable element in AES if
available.
i) XOR of subkey material with the input to the function.
ii) f function.
iii) Permutation p.
iv) Swapping of halves of the block. (Analysis) (NOV/DEC 2017)
2. How the counter mode is used for enhancing the effect of a cryptographic algorithm?
(Understand)
3. Given 10 bit key k = 1010000010, Determine k1, k2 where p10 = 3 5 2 7 4 10 1 9 8 6
p8 = 6 3 7 4 8 5 10 9 by using SDES key generation method? (Evaluate)
ASSIGNMENT – 2
1. Formulate Triple DES and its applications and design the key discarding process of DES.
(Understand)
2. Discuss about Differential and Linear Cryptanalysis. (Remember)
3. Describe the Meet-in-the-Middle Attack (Understand)
YA = X mod q = 25 mod 11 =3
A
X
YB = B mod q = 125 mod 11 =4
K = (YA) XB mod q = 27 mod 11 =5
K = (YB) X A mod q = 16 mod 11 =5
17. Perform encryption and decryption using RSA Alg. for the following. (NOV/DEC 2017)
P=7; q=11; e=17; M=8. (APRIL/MAY 18)
Soln:
n = pq
n = 7*11=77
Φ(n) = (p-1)(q-1)
=6*10 = 60
e =17 , d =27
C = M e mod n
C = 817 mod 77
= 57
M = Cd mod n
= 5727 mod 77
=8
18. What is an elliptic curve? (NOV/DEC 2016) (Remember)
The principle attraction of ECC compared to RSA, is that it appears to offer equal security
for a far smaller key size, thereby reducing processing overhead.
19. Define Euler’s phi function. (Remember)
Euler’s phi function (n) returns the number of integers from GCD 1 to n that are relatively prime
to n. The phi function is computed (n) using various methods. They are
1. If n is a prime number, then (n)=n-1.
2. If n is a composite number, then
2.1 Find the prime factors of that number and compute the phi function value as
used in Step 1.
otherwise,
2.2 Find prime powers (Pa) of the given number n, for computing the phi value of
prime powers we have to use (Pa-Pa-1)
12. Users Alice and Bob use the Diffie-Hellman key exchange technique with a common prime
q = 83 and a primitive root = 5. (Analyze)
i) If Alice has a private key Xa = 6, what is Alice's public key?
ii) If Bob has a private key Xs = 10, what is Bob's public key?
iii) What is the shared secret key?
13. Explain Diffie-Hellman Key exchange algorithm in detail (Remember) [NOV/DEC 19]
14. Explain the working of RSA and choose an application of your choice for RSA and show how
encryption and decryption is carried out. (Understand) [NOV/DEC 19]
PART – C
1. State Chinese Remainder theorem and find X for the given set of congruent
equations using CRT. (APR/MAY 2017) (Understand)
X=2(mod 3)
X=1(mod 5)
X=1(mod 5)
X=3(mod 9)
X=4(mod 11)
2. State and prove the Chinese remainder theorem. What are the last two digits of 4919? (Evaluate)
(APRIL/MAY 18)
3. Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6with a module
of P=11. Calculate all the points in E11 (1, 6). Start by calculation by the right hand side of the
equation for all the values of n? (Evaluate)
4. Explain RSA algorithm, perform encryption and decryption to the system with p=7, q=11,
e=17, M=8. (Understand) (NOV/DEC 2016) (NOV/DEC 2017)
5. Why ECC is better the RSA? However, why is it not widely used? Defend it. (Understand)
(NOV/DEC 2018)
ASSIGNMENT - 3
1. Explain MILLER RABIN PRIMALITY Algorithm. (Understand)
2. Users A and B use the Diffie-Hellman key exchange technique with a common prime q=71 and
a primitive root a=7. If user A has private key XA=5, what is A’s public key YA?. (Evaluate)
3. Alice wants to generate a pair of RSA public and private keys. She starts by selecting two
primes p = 5 and q = 7. (Evaluate)
(a) Compute n, 1(n)?
(b) In selecting a decryption (private) key d, Alice decides d = 3 is not good. Why? She selects d
= 11 instead. Which is correct encryption (public) key, e1 = 11 or e2 = 13?
(c) Suppose Bob wants to send a message M = 33 to Alice, Which key should he use? What’s the
cipher text he sends to Alice?
(d) After Alice receives the cipher text, how does she decrypt?
(e) If Alice wants to send B a signed message, given M’ = 6, what would Alice send?
(f) How does Bob verify the message sent by Alice?
15. How a digital signature differs from authentication protocols? (APRIL/MAY 18)
(Remember)
MACs can be created from unkeyed hashes (e.g. with the HMAC construction), or created
directly as MAC algorithms.
A (digital) signature is created with a private key, and verified with the corresponding
public key of an asymmetric key-pair. Only the holder of the private key can create this
signature, and normally anyone knowing the public key can verify it. Digital signatures don't
prevent the replay attack mentioned previously.
16. Define the term message digest. (Understand) (NOV/DEC 2018)
A message digest is a cryptographic hash function containing a string of digits created by a
one-way hashing formula
17. Contrast various SHA algorithms. (Understand) (NOV/DEC 2018)
SHA-0: The original version of the 160-bit hash function published in 1993 under the name
"SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw"
and replaced by the slightly revised version SHA-1.
SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This was
designed by the National Security Agency (NSA) to be part of the Digital Signature
Algorithm.
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-
256 and SHA-512. SHA-256 uses 32-bit words where SHA-512 uses 64-bit words.
SHA-3: It supports the same hash lengths as SHA-2, and its internal structure differs
significantly from the rest of the SHA family.
18. What are birthday attacks? (APR/MAY 2014) (Remember)
If an encrypted 64 bit hash code C is transmitted with the corresponding unencrypted message M ,
then an opponent would need to find an M ’ such that H(M’) = H(M)to substitute another message
to substitute another message and fool the receiver. Thus the user has to try about 263
combinations to find one that matches the hash code of the intercepted message. This is called as
Birthday attack.
19. Define Kerberos. (Understand)
Kerberos is an authentication service developed as part of project Athena at MIT. The problem
that Kerberos address is, assume an open distributed environment in which users at work stations
wish to access services on servers distributed throughout the network.
20. What is Kerberos? What are the uses? (Understand)
Kerberos is an authentication service developed as a part of project Athena at MIT.Kerberos
provides a centralized authentication server whose functions is to authenticate servers.
21. What 4 requirements were defined by Kerberos? (Remember)
Secure
Reliable
Transparent
Scalable
WWW,
electronic mail,
user authentication,
IPsec.
28. List the 3 classes of intruder? (NOV/DEC 2016) (Remember) (APR/MAY 2019)
1) Masquerader
2) Misfeasor
3) Clandestine user.
PART - B
1. What are the properties a hash function must satisfy? (6) (NOV/DEC 2009) (Remember)
2. Explain MD5 Message Digest algorithm with its logic and compression function? (16)
(NOV/DEC 2009)(Understand)
3. How does SHA-1 logic produce message digest? (10) (APR/MAY 2009)(Analysis)
4. Explain the challenges/ response approach in mutual authentication. (6) (APR/MAY 2009)
(Understand)
5. Explain Digest signature algorithm (DSA) in detail. (10) (APR/MAY 2009)
(APR/MAY 2017) (Understand)
Suggest the security scheme to be adopted in client and server side to accommodate the above
requirements and justify your recommendations. (Create) [NOV/DEC 19]
7. Suggest and explain about an authentication scheme for mutual authentication between the user
and the server which relies on symmetric encryption. (Analyze) [NOV/DEC 19]
ASSIGNMENT - 4
1. Illustrate about SHA algorithm and explain? (Understand)
2. Explain about MD5 in detail? (Understand)
3. Apply the MAC on the Cryptographic checksum method to authenticate build confidentiality of
the message where the authentication is tied to the message M = 8376, K1 = 4892 and K2 =
53624071. (Apply)
10. What are the headers fields define in MIME? (Remember) (APR/MAY 2019)
a) MIME version.
b) Content type.
c) Content Transfer encoding.
d) Content id.
e) Content description
11. Give the steps for preparing envelope data MIME? (Understand)
Generate Ks.
i) Encrypt Ks using recipient’s public key.
ii) RSA algorithm used for encryption.
iii) Prepare the ‘recipient info block’.
iv)Encrypt the message using Ks
12. What is the general format for PGP message? (Understand)
22. Differentiate Transport and Tunnel mode in IPsec? (May 2015) (NOV/DEC 2018)
(Analyze)
23. What is Authentication Header? Give the format of the IPsec Authentication Header?
(Remember)
27. What are the different between SSL version 3 and TLS? (APRIL/MAY 18) (Analyze)
SSL TLS
In SSL the minor version is 0 and * In TLS, the major version is 3 and the the major
version is 3 minor version is 1.
SSL use HMAC alg., except that * TLS makes use of the same alg. the padding bytes
concatenation.
SSL supports 12 various alert * TLS supports all of the alert codes codes. defined in SSL3
with the exception of no _ certificate.
28. What is mean by SET? What are the features of SET? (Understand)
Secure Electronic Transaction (SET) is an open encryption and security specification
designed to protect credit card transaction on the internet.
Features are:
i) Confidentiality of information
ii) Integrity of data
iii) Cardholder account authentication
iv) Merchant authentication
29. What are the steps involved in SET Transaction? (Understand)
The customer opens an account
The customer receives a certificate
Merchants have their own certificate
The customer places an order.
The merchant is verified.
The order and payment are sent.
The merchant requests payment authorization.
The merchant confirm the order.
The merchant provides the goods or services.
The merchant requests payment.
30. What is dual signature? What it is purpose? (Remember)
The Dual Signature is a concept introduced with SET (Secure Electronic Transaction), the
purpose of the dual signature is to link two messages that intended for two different recipients,
and to avoid misplacement of orders.
31. Expand and define SPI .(APR/MAY 2013) (Understand)
The Security Parameter Index (SPI) is an identification tag added to the header while using IPsec
for tunneling the IP traffic. This tag helps the kernel discern between two traffic streams where
different encryption rules and algorithms may be in use.
The SPI is a required part of an IPsec Security Association (SA) because it enables the receiving
system to select the SA under which a received packet will be processed. An SPI has only local
significance, since it is defined by the creator of the SA; an SPI is generally viewed as an opaque
bit string.
Yes. Network Address Translation (NAT) boxes, the computers on your internal network do not
need global IPV4 addresses in order to connect to the Internet
39. What are the effects of malicious software? Write any two. (NOV/DEC 2013)
(Remember)
Malicious software (malware) is any software that gives partial to full control of your
computer to do whatever the malware creator wants. Malware can be a virus, worm, trojan,
adware, spyware, root kit, etc. It provides a new perspective on the impact of malicious agents on
the enterprise software industry
40. What is worm? (NOV/DEC 2013)/ (APR/MAY 2015) (Remember)
A worm is a self-replicating virus that does not alter files but resides in active memory and
duplicates itself. Worms use parts of an operating system that are automatic and usually invisible
to the user.
41. Differentiate spyware and virus. (MAY/JUNE 2014) (Remember)
Spyware and Virus are most common among them. They are both forms of unwanted or
malicious software, sometimes called “malware”. Spyware collects information about you
without appropriate notice and consent. A computer virus spreads software, usually malicious in
nature, from computer to computer.
42. What are Zombies? (MAY/JUNE 2014)(NOV/DEC 2016) (Remember)
A zombie is a computer connected to the Internet that has been compromised by a hacker,
computer virus or trojan horse and can be used to perform malicious tasks of one sort or another
under remote direction.
43. What is logic bomb? (MAY/JUNE 2013) (Remember)
A logic bomb is a piece of code intentionally inserted into a software system that will set
off a malicious function when specified conditions are met. For example, a programmer may hide
a piece of code that starts deleting files (such as a salary database trigger), should they ever be
terminated from the company.
44. List down the four phases of virus. (Understand)
During it lifetime, a virus goes through four phases:
1) Dormant Phase
Here, the virus remains idle and gets activated based on a certain action or event(for
example, a user pressing a key or on a certain date and time etc)
2) Propagation Phase
The virus starts propagating, that is multiplying itself. A piece of code copies itself and
each copy starts copying more copies of self, thus propagating.
3) Triggering Phase
A Dormant virus moves into this phase when it gets activated, that is, the event it was
waiting for gets initialized.
4) Execution Phase
This is the actual work of the virus. It can be destructive (deleting files on disk) or
harmless (popping messages on screen).
45. What is an intruder? (NOV/DEC 2012) (Remember)
An intrusion detection system (IDS) is a device or software application that monitors
network or system activities for malicious activities or policy violations and produces electronic
reports to a management station.
46. Give few examples of worm. (NOV/DEC 2012)/ (APR/MAY 2015) (Remember)
Badtrans
Blaster,
CodeRed, Dabber, etc
47. What is the advantage of Intrusion Detection System over Firewalls? (APR/MAY 2015)
(Understand)
The Intrusion detection system in a similar way complements the firewall security. The
firewall protects an organization from malicious attacks from the Internet and the Intrusion
detection system detects if someone tries to break in through the firewall or manages to break in
the firewall security and tries to have access on any system in the trusted side and alerts the
system administrator in case there is a breach in security.
48. Differentiate macro virus and boot virus. (NOV/DEC 2014)(Analyze)
Boot-sector viruses infect computer systems by copying code either to the boot sector on a
floppy disk or the partition table on a hard disk. During startup, the virus is loaded into memory.
Once in memory, the virus will infect any non-infected disks accessed by the system.
A macro virus is a computer virus that "infects" a Microsoft Word or similar application
and causes a sequence of actions to be performed automatically when the application is started or
something else triggers it. Macro viruses tend to be surprising but relatively harmless.
49. What is a Threat? List their types. (APRIL/MAY 18) (Remember)
A potential for violation of security, which exists when there is a circumstance, capability, action,
or event that could breach security and cause harm. That is, a threat is a possible danger that
might exploit vulnerability.
Image Spam
Phishing
Email Spoofing
Email-Borne Viruses
50. State the difference between threats and attacks. (APRIL/MAY 17) (Analyze)
A threat is a possible danger that might exploit vulnerability.
Attack is defined as an action that compromises the security of information owned by an
organization
51. List various types of firewall. (Remember) (NOV/DEC 2018)
Packet-filtering firewalls
Circuit-level gateways
proxy firewalls
52. Discriminate statistical anomaly detection & rule based detection. (Remember)
(NOV/DEC 2018)
Statistical anomaly detection involves the collection of data relating to the behavior of
legitimate users over a period of time.
With application of rule-based anomaly detection, historical audit records are analyzed to
detect usage patterns and to create the rules that describe those patterns.
53. In SSL and TLS, why is there a separate change_cipher_spec protocol rather than
including a change_cipher_spec message in the Handshake Protocol? (Analyze)
[NOV/DEC 19]
SSL uses messages which are encoded over records. Encryption is done on a per record
basis. However, several messages of the same type (e.g. handshake messages) can be
crammed together in the same record. Since the Change Cipher Spec message modifies
encryption settings, a new record should begin immediately afterwards, so that the new
settings are immediately applied (in particular, it is crucial for security that the Finished
message uses the new encryption and MAC).
Using a specific record type for Change Cipher Spec is a way to enforce this property. An
SSL/TLS implementation cannot help but begin a new record for the finished message, since
it uses a record type distinct from that of the Change Cipher Spec message. Such a specific
record type could be avoided if all SSL/TLS implementations were disciplined enough to
begin a new record where they need, and also to verify that the peer also began a new record.
It is safer and more robust to make it unavoidable through the record type.
PART - B
1. Write short notes on Viruses & Firewalls. Counter measures of virus. (NOV/DEC 2013)/
(NOV/DEC 2012) (NOV/DEC 2018) (Remember)
2. Explain statistical anomaly detection and rule based intrusion detection system. (MAY/JUNE
2014) (APR/MAY 2017) (Understand)
3. Describe any two advanced anti-virus techniques in detail. (MAY/JUNE 2014)/ (NOV/DEC
2014)(Evaluate)
4. Write about virus and related threats in detail. (MAY/JUNE 2013) (Remember)
5. Explain in briefly about trusted system. (MAY/JUNE 2013) (Understand)
6. Write notes on classifications of viruses and Worm counter measures. (APR/MAY 2015)/
(NOV/DEC 2014) (Remember)
7. Explain the characteristics and types of firewalls. (APR/MAY 2015)(NOV/DEC 2016)
(APR/MAY 2019) (Remember).
8. Discuss how firewa1ls help in the establishing a security framework for an organization.
(NOV/DEC 2017) (Analyze)
9. Explain how secure electronic transaction (SET) protocol enables e-transactions in details.
Explain the components involved. (NOV/DEC 2017) (understand)
10. What is Kerberos? Explain how it provides authenticated service. (APR/MAY 2019)
(Understand)
11. Explain the format of the X.509 certificate. (APR/MAY 2019) (Understand)
12. Illustrate the working principle of SET. Relate SET for E-commerce applications. (NOV/DEC
2018) (understand)
13. Explain the operational description of PGP. (Apr/May 2011)(Nov/Dec 2011)(May 2014)
(NOV/DEC 2016) (APRIL/MAY 18) (Understand)
14. Write Short notes on S/MIME (Apr/may 2013) (NOV/DEC 2018) (Remember)
15. Explain the Architecture of IP security. (Nov/Dec 2010)(Apr/May 2011) (APR/MAY 2017)
(APR/MAY 2019) (Remember)
16. Write short notes on authentication header and ESP (Apr/May 2010) (APR/MAY 2017))
(Remember)
17. Explain in detail the operation of Secure Socket Layer (SSL/TLS) in detail. (Nov/Dec 2011)
(May 2015) (Nov/Dec 2018) (Understand)
18. Explain Secure Electronic transaction with neat diagram. (OR) Write Short notes on the
Secure Electronic Transaction (Nov/Dec 2011) (Nov/Dec 2010) (NOV/DEC 2016)
(APRIL/MAY 18) (Understand)
19. Discuss about X.509 authentication service in detail (Apr/May 2013) (Understand)
20. Explain about the Security standards. (NOV/DEC 2013) (Understand)
22. Illustrate how PGP encryption is implemented through a suitable diagram. (Understand)
(APRIL/MAY 18) (APR/MAY 2019)
23. Discuss about the components involved in e-transactions using Secure Electronic Transaction
protocol. Specify how it ensures the security during transactions. (Understand) [NOV/DEC 19]
24. Explain in detail about the types of Firewalls and mention the design criteria of a firewall to
protect the host machines in an educational institution. (Understand) [NOV/DEC 19]
25. Using the PGP cryptographic functions, explain the security offered for e-mails in detail
(Remember) [NOV/DEC 19]
26. Discuss in detail about IP Security architecture and the services offered by IPSec.
(Remember) [NOV/DEC 19]
PART - C
1. Write the steps involved in the simplified form of the SSL/ILS protocol. (NOV/DEC 2017)
(Understand)
2. Write the methodology involved in computing the keys in SSI/ILS protocol. (NOV/DEC 2017)
(Understand)
3. Discuss the different types of virus in detail.Suggest scenario for deploying these in network
scenario. (APR/MAY 2017) (Analyze)
4. How does screened host architecture for firewalls differ from screened subnet firewall
architecture? Which offers more security for information assets on trusted network?Explain with
neat sketch. (APRIL/MAY 18) (Understand)
5. Evaluate the performance of PGP. Compare it with S/MIME. (NOV/DEC 2018) (Understand)
ASSIGNMENT - 5
1. Elaborate the key rings and its significance in PGP. Compose the message generation from
sender to receiver and explain with suitable diagram. (Understand)
2. Explain Secure Electronic transaction with neat diagram. (Understand)
3. Describe S/MIME. (Remember)
4. Explain the characteristics and types of firewalls (Understand)