CS8792-CNS - 2marks
CS8792-CNS - 2marks
CS8792-CNS - 2marks
X.800 categorize the attacks into two, namely passive and active attacks.
Passive attacks: Passive attacks are in the nature of eavesdropping on, or monitoring
of,transmissions. It includes release of message contents and Traffic analysis. Passive attacks are
very difficult to detect because they do not involve any alteration of data. However, it is feasible
to prevent the success of these attacks, usually by means of encryption.
Active attacks: Active attack involves some modification of the data stream or the creation of
afalse data stream and can be subdivided into four categories namely as a masquerade, replay,
modification of messages and the denial of service attack.
7. What is encipherment?
The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an algorithm and
zero or more encryption keys.
2. Determine Ø(n) directly, without first determining p and q. Again, this enables
-1
determination of d ≡e (mod Ø(n)).
3. Determine d directly, without first determining Ø(n).
5. What are the requirements for the use of a public-key certificate scheme?
8. What is DES?
Data Encryption Standard (DES) is a widely-used method of data encryption using a
private (secret) key. DES applies a 56-bit key to each 64-bit block of data. The process can run in
several modes and involves 16 rounds or operations.
10. What are two levels of functionality that comprise a message authentication or digital
signature mechanism?
At the lower level, there must be some sort of function that produces an authenticator: a
value to be used to authenticate a message. This lower-level function is then used as primitive in
a higher-level authentication protocol that enables a receiver to verify the authenticity of a message.
12. What is the difference between a message authentication code and a one-way hash
function? (N/D-09)
A hash function, by itself, does not provide message authentication. A secret key must be
used in some fashion with the hash function to produce authentication. A MAC, by definition, uses
a secret key to calculate a code used for authentication.
13. What are the entities that constitute a full-service kerberos environment?
A full service environment consists of a Kerberos server, a number of clients and a number
of application servers.
Handshake Protocol.
Alert Protocol.
2. Define TLS
b) Public keys.
c) Private keys.
6. Define – Virus
Computer Viruses is defined as the malicious software programs that damage computer
program entering into the computer without the permission of the users, and also run against the
wishes of the users. They are replicated by themselves. Viruses are so dangerous and malicious
that they can be automatically copied and pasted from memory to memory over and over.
Types of virus:
Boot sector Virus
Macro virus
Multipartite Virus
Stealth virus
7. What is application level gateway?
An application gateway or application level gateway (ALG) is a firewall proxy which
provides network security. It filters incoming node traffic to certain specifications which mean
that only transmitted network application data is filtered. Such network applications include File
Transfer Protocol (FTP), Telnet, Real Time Streaming Protocol (RTSP) and BitTorrent.