CNS Short Only
CNS Short Only
4. Define Non-repudiation.
CNS 1
5. Define Security service.
9. Define Steganography.
CNS 2
The main goal is to conceal the existence of the message.
10. What are the two basic functions used in encryption algorithms?
Stream Cipher: Encrypts data one bit or byte at a time (e.g., RC4), useful
for continuous data streams.
Block Cipher: Encrypts fixed-size data blocks (e.g., AES), commonly used
in secure storage and file encryption.
Stream ciphers are generally faster, but block ciphers offer better security
for bulk data encryption.
Number of Rounds: More rounds make the cipher more secure but
increase processing time.
CNS 3
Key Scheduling: Determines how subkeys are derived for each round,
impacting encryption complexity.
4. How many keys are required for two people to communicate via a cipher?
Symmetric Encryption: Only one shared key is required between the two
parties.
Euler's Theorem states that for any integer a that is coprime with a
positive integer m, the remainder of aϕ(m) divided by m is 1.
The complexity of algorithms like RSA makes it inefficient for large data,
often leading to performance issues.
It’s typically used for encrypting small amounts of data, such as keys,
rather than large files.
CNS 4
In this attack, the attacker can pick a ciphertext (an encrypted message),
get it decrypted using the public key, and then use the decrypted data to
figure out the private key.
10. If a bit error occurs in plaintext block b1, how far does the error propagate in
CBC mode of DES?
In CBC (Cipher Block Chaining) mode, a bit error in block b1 affects both
b1 and b2 during decryption.
b1b1
b1b1
b2b2
The error spreads only to the next block, making CBC mode relatively
error-tolerant.
SHA (e.g., SHA-256) has a larger hash output, making it harder to find
collisions.
CNS 5
SHA was designed with a more complex structure, reducing vulnerabilities
compared to MD5.
SHA-1 and SHA-256: Part of the SHA family, offering stronger hash
outputs.
CNS 6
This approach reduces the time complexity of breaking double encryption
schemes.
Integrity: Ensures that the message has not been tampered with.
Collision Resistance: Hard to find two inputs producing the same hash.
Ensures data integrity by verifying that the data has not been altered.
CNS 7
It combines a hash function with a secret key, ensuring that only parties
with the key can verify the MAC.
3. Define S/MIME.
S/MIME is widely used in email clients and allows users to send and
receive secure emails.
CNS 8
The X.509 standard defines a framework for public key infrastructure
(PKI), primarily for digital certificates.
This format facilitates secure key exchange over networks like the internet.
7. What security options does PGP allow when sending an email message?
CNS 9
8. What is a Replay Attack?
10. Why are the leading two octets of the message digest stored in a PGP
message along with the encrypted message digest?
The leading two octets act as a verification for the encrypted message
digest, enhancing integrity.
It allows the recipient to detect if the message has been tampered with
before attempting to decrypt it.
Polymorphic viruses are viruses that change their code each time they
infect a new system, making detection difficult.
CNS 10
This type of malware can mutate, making it more challenging to identify
and remove.
3. Define ZOMBIE.
The user is often unaware that their system has become a zombie.
4. The internal code of any software that will set off a malicious function when
specified conditions are met is called?
CNS 11
A Logic Bomb is a piece of code inserted into software that triggers a
malicious action when specific conditions are met.
It can delete files, corrupt data, or perform other damaging activities upon
activation.
Malware: Viruses, worms, and Trojans that can infect and harm the OS.
Types include:
CNS 12
It often includes access control mechanisms, data integrity checks, and
regular audits.
CNS 13