QB PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

CS6701-CRYPTOGRAPHY AND NETWORK SECURITY

Question Bank
Unit-I
Part A
1. Differentiate between passive attacks and active attacks.
S.No Passive Attack Active Attack
Passive attacks are in the Active Attacks involve some
1 nature of eavesdropping on, or modification of the data stream or the
monitoring of transmissions. creation of a false stream.

2 Types: Release of message Types: Masquerade, replay, modification


contents and traffic analysis of message and denial of service.
3 Very difficult to detect. Easy to detect.
The emphasis in dealing with
passive attacks is on
4
prevention rather than It is quite difficult to prevent active
detection. attacks absolutely.
5 It does not affect the system. It affects the system.

2. What is the use of Fermat’s theorem?


Fermat‟s theorem sometimes is helpful for quickly finding a solution to some
exponentiations and multiplicative inverses when the modulus is a prime.

3. What is discrete logarithm?

Discrete logarithms are fundamental to a number of public-key algorithms, including


Diffie-Hellman key exchange and the digital signature
algorithm (DSA). The logarithm of a number is defined to be the power to which some
positive base (except 1) must be raised in order to equal the number. If working with
modulo arithmetic, and the base is a primitive root, then an integral discrete logarithm
exists for any residue.

4. Why modular arithmetic has been used in cryptography?


Applications of modular are given to divisibility tests and to block ciphers in
cryptography. Modular arithmetic directly underpins public key system such as RSA and
Diffie-Hellman as well as providing finite fields which underlie elliptic curves and is used in
a variety of symmetric key algorithms including AES, IDEA and RC4.
5. Find 117 mod 13.
To find 117 mod 13,
112 = 121 4 (mod 13)
114 = (112)2 42 3 (mod 13)
117 11 4 3 132 2 (mod 13)
6. State Euler’s theorem.

7. Define finite field


Finite field is a field that contains a finite number of elements. The finite fields are classified by
size; there is exactly one finite field up to isomorphism of size p k for each prime p and positive
integer k.
8.What are the two basic functions used in encryption algorithms.
All the encryption algorithms are based on two general principles:
Substitution: In which each element in the plaintext is mapped into another element.
Transposition: In which elements in the plaintext are rearranged. The fundamental requirement
is that no information be lost.
9. Define threat and attack.
A potential for violation of security, which exists when there is a circumstance, capability ,action or
event that could breach security and cause harm. That is, a threat is a possible danger that might
exploit vulnerability.
An attack on system security that derives from an intelligent threat: that is an intelligent act that is a
deliberate attempt to evade security services and violate the security policy of a system.
10. Give the types of attack.
Passive attack
Active attacks
11. List out the problems of one time pad?
Problem with one time pad is that of making large quantities of random keys. It also makes the
problem of key distribution and protection.

12. Define steganography.


Steganography is the art and science of writing hidden messages in such a way that no one, apart
from the sender and intended recipient, suspects the existence of the message, a form of security
through obscurity.
13. What is the difference between a monoalphabetic cipher and a
polyalphabetic cipher?
In monoalphabetic cipher single cipher alphabet is used per message. But in polyalphabetic
cipher there are multiple ciphertext letters for each plaintext letter, one for each unique letter
of keyword.

14. What is discrete logarithm problem?


Discrete Logarithm Problem(DLP) is easy to perform and hard to reverse. The strength of
one way function is based on time needed to reverse it.
Let a cyclic finite group and g G be a generator of G. The DLP in G is following:
Given an element h G , find the smallest positive integer x such that
h = [x]g (additive group)
h = g x (multiplicative group)
15. What do you mean by cryptanalysis?
Techniques used for deciphering a message without any knowledge of the enciphering details fall in
to the area of cryptanalysis. Cryptanalysis is what the layperson calls “breaking the code.”The areas
of cryptography and cryptanalysis together re called cryptology.Cryptanalytic attacks rely on the
nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext
or even some sample plaintext–ciphertext pairs. This type of attack exploits the characteristics of
the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

Part B
1. State and Describe Fermat’s theorem and Euler’s theorem(16)
2. Explain about classical crypto systems (substitution and transposition)with two examples for
each.
3. List the different types of attacks and explain in detail.(8)
4. Describe Chinese remainder theorem with example.(8)
5. Evaluate321 mod11using Fermat’s theorem.(4)
6. Find GCD using Euler’s Theorem. Find GCD of 1070and 1066 using Euclid
algorithm.(8)
7. Encrypt the message “PAY” using hill cipher with the following key matrix and show
the decryption to formulate original plaintext(8)
|17 17 5|
K=|21 1821|
|2 2 19|
8. Generalizethesecurityservicesclassificationsandsecuritymechanismsin detail.(8)
9. Summarize the following in detail
(i) Modular Exponentiation(8)
(ii) Finite fields(8)
10. Apply Caesar cipher and k=5 decrypt the given Ciphertext
“YMJTYMJWXNIJTKXNQJSHJ”. (8)
11. Apply Vigenere cipher; encrypt the word “explanation” using the key “leg”. (8)
12.
(i) Discuss briefly the Discrete Algorithms.(8)
(ii) Discuss about the Groups, Rings and Field(8)
13. With a neat block diagram, explain the network security model and the important
parameters associated with it.(8)
14. Differentiate active and passive security attacks. Categorize these attacks and explain one
examples of each(8)
15. State the Chinese Remainder Theorem and find X for the given set of congruent equations
X≡2 mod 3, X≡3 mod 5 and X≡2 mod 7.
16. Discuss the following
a) Message Integrity(2) b) Denial of Service(2) c) Availability(2)
d) Authentication(2)
Unit-II
Part A

1. Prove that 3 is a primitive root of 7.


That is, if is a primitive root of the prime number, then the numbers
a mod p, a2 mod p,… ap-1 mod p
3 mod 7, 9 mod 7, 27 mod 7, …. 656 mod 7
3, 2, 6,…..5.

2. Write any one technique of attacking RSA.


The most widely used public-key cryptosystem is RSA. The difficulty
of attacking RSA is based on the difficulty of finding the prime factors of a composite number.
THE FACTORING PROBLEM: We can identify three approaches to attacking RSA
mathematically.
1. Factor n into its two prime factors .This enables calculation of
Ø(n) =(p-1)x(q-1) ,which in turn enables determination of d ≡e-1 (mod Ø(n)).
2.Determine Ø(n) directly, without first determining p and q. Again, this enables
determination of d ≡e-1 (mod Ø(n)).
3.Determine d directly, without first determining Ø(n).

3. What is differential cryptanalysis?


Differential cryptanalysis is a technique in which chosen plaintexts with particular XOR
difference patterns are encrypted. The difference patterns of the resulting ciphertext provide
information that can be used to determine the encryption key.

4. What is linear cryptanalysis?


This attack is based on finding linear approximations to describe the transformations
performed in DES. This method can find a DES key given 2 43 known plaintexts, as compared to
247 chosen plaintexts for differential cryptanalysis. Although this is a minor improvement,
because it may be easier to acquire known plaintext rather than chosen plaintext, it still leaves
linear cryptanalysis infeasible as an attack on DES. So far, little work has been done by other
groups to validate the linear cryptanalytic approach.

5. What are the requirements for the use of a public-key certificate scheme?
Four requirements can be placed on this particular scheme:
1 Any participant can read a certificate to determine the name and public key
of the certificate’s owner
2 Any participant can read a certificate to determine the name and public
key of the certificate’s owner
3 Only the certificate authority can create and update certificates
a) Any participant can verify the currency of the certificate

6. What are the different modes of operation in DES?


1. Double DES
2. Triple DES
3. Electronic Code Book
4. Counter mode
5. Cipher block chaining mode
6. Cipher Feedback mode
7. What are the CFB and OFB modes?
The Cipher Feedback (CFB) mode and the Output Feedback (OFB) mode are two
Standard modes of operation a block cipher.
In CFB mode the previous ciphertext block is encrypted and the output produced is
combined with the plaintext block using exclusive-or to produce the current ciphertext block.
OFB mode is similar to the CFB mode except that the quantity exclusive-oared with each
plaintext block is generated independently of both the plaintext and ciphertext.
8. What is DES?
Data Encryption Standard (DES) is a widely-used method of data encryption using a
private (secret) key. DES applies a 56-bit key to each 64-bit block of data. The process can run
in several modes and involves 16 rounds or operations.
9. Compare the symmetric and asymmetric key cryptography.
 Symmetric Encryption uses a single secret key that needs to be shared among the people
who needs to receive the message while Asymmetric encryption uses a pair of public key,
and a private key to encrypt and decrypt messages when communicating.
 Symmetric Encryption is an age old technique while asymmetric Encryption is
relatively new.
 Asymmetric Encryption was introduced to complement the inherent problem of the
need to share the key in symmetric encryption model eliminating the need to share the key
by using a pair of public-private keys.

10. What are the disadvantages of double DES?


The following are the disadvantages of double DES
1. Reduction to a single stage.
2. Meet in the middle attacks.
3. Double DES is less secure than triple DES.
4. Double DES is within brute force attack.
Part B

1. Describe in detail, the key generation in AES algorithm and its expansion format.(16)
2. Describe Triple DES and its applications.(8)
3. Explain the modes of operation in block cipher.
4. Formulate the single round of DES algorithm and design the key discarding process of DES.
5. Describe the RC5 method used for encryption and decryption
6. Draw the general structure of DES and describe how encryption and decryption
are carried out and identify the strength of DES algorithm.
7. Analyze how meet in middle attack is performed on double Data
Encryption
8. Discuss in detail about Blowfish.
9. Evaluate using Diffie-Hellman key exchange technique. Users A and B use a common
prime q=11and a primitive root alpha=7.(i)If user A has private key XA=3.Whatis A’s
public key YA? (ii)If user B has private key XB=6.Whatis B’s public key YB? (iii)What is
the shared secret key? Also
10. Describe RSA Algorithm and Estimate the encryption and decryption values for the RSA
algorithm parameters.
11. How is d iscrete logarithme valuated for a number? Summarize the role of discrete log in the
Diffie-Hellman key exchange in exchanging the secret key among two users?
12. What a r e e l l i p t i c c u r v e s ? Describe how the elliptic curves are useful for
13. Briefly describe the idea behind Elliptic Curve Cryptosystem and describe the key management
of public key
13. Apply the m a t h e m a t i c a l foundations of R S A algorithm. Perform encryption decryption f
o r t h e f o l l o w i n g d a t a .P=17, q=7, e=5, n=119, message=”6”. Use Extended Euclid’s
algorithm to find the private key.
14. User A and B use Diffie-Hellman key exchange a common prime q=71 and a
primitive root a=7.Calculate the following. If user A has private key XA=5, what
is A’s public key YA. If user A has private key XB=12, what is B’s public key YB
and what is shared secret key?
15. Consider the elliptic curve E11(1,6);that is the curve is defined by y2=x3+x+6 with a modules
of P=11. Calculate all the points in E11(1,6). Start by calculation the right hand side of the
equation of all the values of n?
16. Explain briefly about Diffie-Hellman key exchange algorithm with its pros and cons.
Unit-III
HASH FUNCTIONS AND DIGITAL SIGNATURES
Part A

1. What is meant by the Diffie-Hellman key exchange?


An element g is called a generator of a group G if every element in G
can be expressed as the product of finitely many powers of g.
If p≥1 is an integer, then the numbers coprime to p, taken modulo p, form a group with
multiplication as its operation. It is written as (Z/pZ)×or Zp*.

2. How does Diffie-Hellman key exchange achieve security?


Diffie–Hellman key exchange is a specific method of exchanging cryptographic keys. It
is one of the earliest practical examples of key exchange implemented within the field
of cryptography. The Diffie–Hellman key exchange method allows two parties that have no
prior knowledge of each other to jointly establish a shared secret key over an
insecure communications channel. This key can then be used to encrypt subsequent
communications using a symmetric key cipher.

3. What is weak collision resistance? What is the use of it?


For any given block x, It is computationally infeasible to find Y ≠ X with H(Y) ≠ H(X).
It guarantees than an alternative message hashing to the same value as a given message cannot
found. This prevents forgery when as encrypted hash code is used.

4. What is meant by EIGamal cryptosystem?


The ElGamal system is a public-key cryptosystem based on the discrete logarithm
problem. It consists of both encryption and signature algorithms. The encryption algorithm is
similar in nature to the Diffie-Hellman key agreement protocol.

5. What is meant by one-way property in hash function?


For any given code h, it is computationally infeasible to find X such that H(x) = h. A
hash function, by itself, does not provide message authentication. A secret key must be used in
some fashion with the hash function to produce authentication. A MAC, by definition, uses a
secret key to calculate a code used for authentication.
6. List out the requirements of kerberos.
The requirements of Kerberos are as follows:
(1) Secure (2) Reliable (3) Transparent (4) Scalable
7. What is meant by life cycle of a key?
Keys have limited lifetimes for a number of reasons. The most important reason is
protection against cryptanalysis. Each time the key is used, it generates a number of ciphertexts.
Using a key repetitively allows an attacker to build up a store of ciphertext (and possibly
plaintexts) which may prove sufficient for a successful cryptanalysis of the key value. If you
suspect that an attacker may have obtained your key, then your key is considered compromised.
8. What is a hash function?
A hash function H is a transformation that takes a variable-size input m and returns a
fixed-size string, which is called the hash value h (that is, h = H(m)). Hash functions with just
this property have a variety of general computational uses, but when employed in cryptography
the hash functions are usually chosen to have some additional properties.

9. What are the types of attacks addressed by message authentication?


There are four types of message authentication:
a. Masquerade: Insertion of messages into the network from a fraudulent source. This
includes the creation of messages by an opponent that are purported to come from an
authorized entity. Also included are fraudulent acknowledgments of message receipt
or no receipt by someone other than the message recipient.
b. Content modification: Changes to the contents of a message, including insertion,
deletion, transposition, and modification.
c. Sequence modification: Any modification to a sequence of messages between parties,
including insertion, deletion, and reordering.
d.Timing modification: Delay or replay of messages. In a connection-oriented
application, an entire session or sequence of messages could be a replay of some
previous valid session, or individual messages in the sequence could be delayed or
replayed. In a connectionless application, an individual message (e.g., datagram)
could be delayed or replayed.
10. What are two levels of functionality that comprise a message authentication or digital
signature mechanism?
At the lower level, there must be some sort of function that produces an authenticator: a
value to be used to authenticate a message. This lower-level function is then used as primitive in
a higher-level authentication protocol that enables a receiver to verify the authenticity of a
message.

11. What is the difference between an unconditionally secure cipher and a computationally
secure cipher?
An encryption scheme is unconditionally secure if the ciphertext generated by the
scheme does not contain enough information to determine uniquely the corresponding plaintext,
no matter how much ciphertext is available. An encryption scheme is said to be computationally
secure if: (1) the cost of breaking the cipher exceeds the value of the encrypted information, and
(2) the time required to break the cipher exceeds the useful lifetime of the information.
12. What is the difference between a message authentication code and a one-way hash
function?
A hash function, by itself, does not provide message authentication. A secret key must be used in some
fashion with the hash function to produce authentication. A MAC, by definition, uses a secret key to
calculate a code used for authentication
PART-B

1. Where hash functions are used? What characteristics are needed in secure hash Function?
Write about the security of hash functions and MACs
2. Describe digital signature algorithm and show how signing and verification is done using
DSS.
3. Explain the process of deriving eighty 64-bitwords from 1024 bits for processing of a single
blocks and also discuss single round function in SHA-512 algorithm. Show the values of
W16,W17,W18 and W19.
4. What is Digital Signature? Explain how it is created at the sender end and retrieved at receiver
end differentiate digital signature from digital
5. Describe HMAC algorithm in detail and Give the classification of authentication function in
detail.
6. Compare and generalize t h e features of SHA and MD5algorithm.
7. Analyze the MD5 message digest algorithm with necessary block
8. Describe in detail El-Gamal Public key cryptosystems with an example.
9. Illustrate Secure Hash Algorithm in detail andclassifyitsperformancewithMD5.
10. Give abriefnotesonX.509authenticationservices.
11. Discuss the security of hash functions and MACs and describe any one method of efficient implementation
of HMAC.
UNIT –IV
SECURITY PRACTICE & SYSTEM SECURITY
PART-A
1 .Why does PGP generate a signature before applying compression?
The signature is generated before compression due to 2 reasons:
It is preferable to sign an uncompressed message so that one can store only the
uncompressed message together with the signature for future.

2. Write the four SSL Protocols.


1. SSL Handshake protocol
2. SSL Change cipher spec. protocol
3. SSL Alert Protocol
4. SSL Record Protocol

3. What is meant by S/MIME?


S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key
encryption and signing of MIME data. S/MIME is on an IETF standards track and defined in a
number of documents, most importantly RFCs (3369, 3370, 3850, 3851). S/MIME was
originally developed by RSA Data Security Inc. The original specification used the IETF MIME
specification with the de facto industry standard PKCS secure message format. Change control
to S/MIME has since been vested in the IETF and the specification is now layered on
cryptographic message syntax.

4. What are the services provided by IPSec?


The services provided by IPSec are authentication, confidentiality and key management
authentication. It ensures the identity of an entity. Confidentiality is protection of data from
unauthorized disclosure. Key management is generation, exchange, storage, safeguarding, etc.
of keys in a public key cryptography.

5. What is meant by replay attack?


A replay attack (also known as playback attack) is a form of network attack in which a
valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out
either by the originator or by an adversary who intercepts the data and retransmits it, possibly as
part of a masquerade attack by IP packet substitution (such as stream cipher attack).

14. What is the difference between an SSL connection and SSL session?
Connection is a transport that provides a suitable type of service. For SSL, such
connections are peer-topeer relationships. The connections are transient. Every connection is
associated with one session. Session: An SSL session is an association between a client and a
server. Sessions are created by the Handshake Protocol. Sessions define a set of cryptographic
security parameters, which can be shared among multiple connections. Sessions are used to
avoid the expensive negotiation of new security parameters for each connection.
7. Why does ESP include a padding field?
The ciphertext needs to end on an eight octet boundary because the Authentication data
field is properly aligned in the packet. This is what the protocol expects and if it doesn't follow
the rules, it's considered to contain an error in the packet. It's like English or other languages.
We expect sentences to end with a period so we know where one sentence ends and the other
begins.

8. What is the problem that kerberos addresses?


The problem that Kerberos addresses is this: Assume an open distributed environment in
which users at workstations wish to access services on servers distributed throughout the
network. We would like for servers to be able to restrict access to authorized users and to be
able to authenticate requests for service. In this environment a workstation cannot be trusted to
identify its users correctly to network services.

9. What is meant by the function of a compression function in a hash function?


The hash function involves repeated use of a compression function. The motivation is
that if the compression function is collision resistant, then the hash function is also collision
resistant function. So a secure hash function can be produced.

10. How is signed data entity of S/MIME prepared?


Secure/Multipurpose Internet Mail Extension is a security enhancement to the MIME
Internet e-mail format standard, based on technology from RSA data security. It is able to sign
and/or encrypt messages.

11. What are the services provided by IPSec?


1. Access control
2. Connectionless integrity
3. Data origin authentication
4. Rejection of replayed packets

12. List out four requirements defined for kerberos.


The four requirements defined for Kerberos are:
1. Secure: A network eavesdropper should not be able to obtain the necessary information to
impersonate a user. More generally Kerberos should be strong enough that a potential opponent
does not find it to be the weak link.
2. Reliable: For all services that relay on Kerberos for access control, lack of availability of the
supported services. Hence, Kerberos should be highly reliable and should employ distributed server
architecture, with one system able to back up another.
3. Transparent: Ideally, the user should not be aware that authentication is taking place, beyond the
requirement to enter a password.
4. Scalable: The system should be capable of supporting large numbers of clients and servers. This
suggests a modular, distributed architecture.
13. What are the entities that constitute a full-service kerberos environment?
A full service environment consists of a Kerberos server, a number of clients and a
number of application servers.

14. What is the need of segmentation and reassembly function in PGP?


E-mail facilities often are restricted to a maximum message length. To accommodate
this restriction, PGP automatically subdivides a message that is too large into segments that are
small enough to send via e-mail. The segmentation is done after all of the other processing,
including the radix-64 conversion. Thus, the session key component and signature component
appear only once, at the beginning of the first segment.

PART-B

1. Formulate what are the requirements of Kerberos? Explain about Kerberos version.
2. Explain the Firewall design principles.
3. What are viruses? Explain the virus related threats and the counter measures applied.
4. What is meant by message digest and explain about HMAC digital signatures.
5. Illustrate the technical details of firewall.
6. Illustrate the three common types of firewalls with diagrams.
7. Describe Secure Electronic Transaction for E-Commerce transaction with neat diagram
8. Summarize on the significant types of virus categories.
9. Whatisatrustedsystem?Expressthebasicconceptofdataaccesscontrolin trusted systems
10. Describethearchitectureofdistributedintrusiondetectionsystemwiththe necessary diagrams
11. List about virus and related threats in detail
12. Estimate what is the role of intrusion detection system? What are the three
benefits that can be provided by the intrusion detection system?
13. Differentiate between statistical anomaly detection and rule based intrusion detection
system?
14. Analyze the architecture of distributed intrusion detection system with the necessary
diagrams.
15. How does screened host architecture for firewalls differ from screened subnet
firewall architecture? Which of for more security for the information assets there
main on the trusted network? Explain with neat sketch?
16. Describe the roles of the different servers in Kerberos protocol. How does the user get
authenticated to the different servers?
17. Give briefly about trusted systems
18. Classify the various measures that may be used for intrusion detection.
19. Show how the encryption is key generated from password in Kerberos?
20. Explain with the help of an example how a user’s certificate is obtained from another
certification authority in X.509scheme
UNIT-V
E-MAIL, IP & WEB SECURITY
PART-A

1. Define – Virus
Computer Viruses is defined as the malicious software programs that damage computer
program entering into the computer without the permission of the users, and also run against
the wishes of the users. They are replicated by themselves. Viruses are so dangerous and
malicious that they can be automatically copied and pasted from memory to memory over and
over.
Types of virus:
Boot sector Virus
Macro virus
Multipartite Virus
Stealth virus
2. What is application level gateway?
An application gateway or application level gateway (ALG) is a firewall proxy which
provides network security. It filters incoming node traffic to certain specifications which mean
that only transmitted network application data is filtered. Such network applications include
File Transfer Protocol (FTP), Telnet, Real Time Streaming Protocol (RTSP) and BitTorrent.

3. List out the design goals of firewalls.


1. All traffic from inside to outside, and vice versa, must pass through the firewall. This
is achieved by physically blocking all access to the local network except via the
firewall.
2. Only authorized traffic, as defined by the local security policy, will be allowed to
pass.
3. The firewall itself is immune to penetration. This implies the use of a hardened
system with a secured operating system.

4. What is meant by intrusion detection system?


An intrusion detection system (IDS) is a type of security software designed to
automatically alert administrators when someone or something is trying to compromise
information system through malicious activities or through security policy violations. An IDS
works by monitoring system activity through examining vulnerabilities in the system, the
integrity of files and conducting an analysis of patterns based on already known attacks. It also
automatically monitors the Internet to search for any of the latest threats which could result in a
future attack.

5. What are audit reports? Writ its two forms.


An information security audit is an audit on the level of information security in an
organization. Within the broad scope of auditing information security there are multiple types
of audits, multiple objectives for different audits, etc. Most commonly the controls being
audited can be categorized to technical, physical and administrative. Auditing information
security covers topics from auditing the physical security of data centers to auditing the logical
security of databases and highlights key components to look for and different methods for
auditing these areas.

6. Define − Password Protection


Password protection is defined as a security process that protects information accessible
via computers that needs to be protected from certain users. Password protection allows only
those with an authorized password to gain access to certain information.

7. Define − Malicious Program


Malicious software is defined as a software written with the intent of causing some
inconvenience to the user of the software. Malicious software in general terms is quite often
called a virus however there are many other forms of malicious software. Some other types of
malicious or potentially malicious software are worms, trojan horses, spyware, and PuPs.

8. What is meant by intruder?


A network is accessed by unauthorized user is called intrusion and the user is called as
intruder.
Classes of intruders:
Masquerader
Misfeasor
Clandestine user
9. What is meant by worm?
A computer worm is a self-replicating computer program that penetrates an operating
system with the intent of spreading malicious code. Worms utilize networks to send copies of
the original code to other computers, causing harm by consuming bandwidth or possibly
deleting files or sending documents via email. Worms can also install backdoors on computers.

10. What is meant by Trojan horse?


In computers, a Trojan horse is a program in which malicious or harmful code is
contained inside apparently harmless programming or data in such a way that it can get control
and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan
horse may be widely redistributed as part of a computer virus.
11. What is meant by logic bomb?
A logic bomb is a malicious program timed to cause harm at a certain point in time, but
is inactive up until that point. A set trigger, such as a preprogrammed date and time, activates a
logic bomb. Once activated, a logic bomb implements a malicious code that causes harm to a
computer. A logic bomb, also called slag code.
12. What are the steps in virus removal process?
Virus should be removed form the system by scanning process. The steps include in this
process are,
2 Backup your data
3 Check to ensure that other factors aren't causing your problem
4 Gather your antivirus tools
5 Reboot in Safe Mode
6 Run your scans
7 Test your computer

13. What is meant by generic decryption technology?


A generic decryption technology can detect most complex polymorphic viruses with
fast scanning speed.

14. What is meant by denial of service?


A denial of service is an attempt to prevent a genuine user of service from using it. A
"denial-of-service" attack is characterized by an explicit attempt by attackers to prevent
legitimate users of a service from using that service. Examples include,
5. Attempts to "flood" a network, thereby preventing legitimate network traffic.
6. Attempts to disrupt connections between two machines, thereby preventing access to a
service.
7. Attempts to prevent a particular individual from accessing a service.
8. Attempts to disrupt service to a specific system or person.

PART-B

1. How does PGP provide authentication and confidentiality for email services and for file transfer
applications? Draw the block diagram and explain the components
2. Explain the general format of PGP message.
3. Summarize the Operations of PGP ? Brief the various services provided by PGP.
4. Discuss the threats faced by an e-mail and explain its security requirements to provide a secure e-mail
service.
5. Describe about the PKI.
6. Describe the ISAKMP format with diagrams
7. Summarize about the authentication header of IP and discuss about encapsulating security payload
of IP
8. List the different protocols of SSL. Explain in detail Hand shake protocol
9. Tell how does the server get authenticated to client in SSL?
10. ExplainIPSecprotocolsindetail.Alsodevelopapplicationsandadvantagesof IPSec.
11. Sketch and analyze the IPSec Document Overview diagram
12. WhatisPGP?Examinehowauthenticationandconfidentialityismaintained in PGP
13. Explain the key rings and its significance in PGP. Show how the message
14. Analyze the Cryptographic algorithms used in S/MIME and Explain S/MIME certification processing

You might also like