Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
98 views
12 pages
Mid
Uploaded by
khalid
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save mid For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
98 views
12 pages
Mid
Uploaded by
khalid
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save mid For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save mid For Later
You are on page 1
/ 12
Search
Fullscreen
En cas [ea Student Name (in English): Student ID: Question 3: Calculation question To be answered in (30) Minutes [4-] /_8_ Marks m using RSA, Trudy intercepts the cipher text C=10 sent to Alice A. Ina public key system v whose public key is@=11, n-51. What is the plain text M?_(3Marks) a’ ps3 alee Ww prq- Bl a a Bn) = O-P)(\-4) ee eb 2 32 a exdz\ wed Gt) 3) Md: \ wed 32 . “a od 3\ 5\ Gagne B. Consider a Diffie-Hellman scheme with a common prime p = 71 and - csi generator g=7 sy 1. I Alice has private key a= 5, what is Alice’s public key? 2. If Bob has private key b= 3, what is his Seed ky = of” wed BF od a mod T_ A A Ce Sedat Name (in English) Studene ID: {6 fresources is shared at different levels, we could be used to “signal” information across 4 communication path not intended as such by systern’s designers called ~ 1S Covert channe! '. Compartnent © MIS Biba Modet Questions TF ‘To be answered in (10) Minutes [ 3 J/-5. Mate 2 | Cayabilics fs good when uses manage their own ies, and easy to change Fights © a resource, | Compartment entorees assess contol up and down but Malilevel Security (MLS) enforces restrictions across security level cH ler co “@ | One advantage of application Proxy is to filter bad data application Seatecree wane e x4 = e} ~] Gaieresognion Tran sample of someing you are ‘ oresecces contol matrirby ecu 7 | Anarchy model asa PRT irustmods offs maltiple wasted CAS, BYOWieh ‘nay have 80 or more ctificates, jst to verify cerificates, User ean ‘dside which CAsto tat [3] Pablo Rey Tafastoctue PRI couais (CRLs) which neoled te seciely we 9" | Based on Hamming dstunce, a (1OTTN [10 | Compare one-to-many in Biometricsadent Name (in English): Student ID: ant To be answered in (30) Minutes [21 /\s. Masks Choose the correct answer and fill the box below with your final choice: 1A eraya ae UK ee 1. One of the main reasons that “something you know” more popular than “something you have” and “something you are” is a, Expensive b. Can be detected Ve Nocost (Pvc) d. Difficult to remember 2. At which layer of the Internet protocol stack does stateful packet filter firewall operate? a. Network layer b. Application layer ¢. Physical layer VE Transport layer 3. could be used as a mitigation technique against flooding of the server by bots masking as new customers. a. C-List b. MLS ve CAPTCHA d. BLP 4, Network-based Intrusion Detection System (NIDS) could use a” Only signature based approach b. Only anomaly based approach ¢. Signature and/or anomaly based approaches wk None of the above ~~ for detecting intrusions. 5. Finger print to authenticate should pass two phases , below figure showing. phase. oa & Ss wi ——— Ve Recognition b. Enrollment c. Identification d. None of the aboveNA? CON ee) Student ID: dent Name (in English): Gk : C. Suppose that Bob's public key consists of (27, 45, 10, 29) along with the multiplier m= 6 and modulus n= 53. (3Marks) 4) Enerypt the message M= 1100010 using the public key. Give your result in decimal Gk (22,45 ,10,24) My = ZTH4S (22) mae 23 Mz 200), 'p) Find mand the private key. whet cl med av Sk = GK Jan ane wtb = \ mod 53 Bf we era | ond oS Sess eso eal 53.7 rae 63/424 enn Ben ss 45 ag Be oceckuas, : ee aa at a ee 136 ©) Find the plaintext given the cipher text C = 37. Give your answer in binary. S3%7~20- 935/4216 a ‘ wrod D. Use the repeated squaring method to efficient yi for 123 ,Xeuaap ss ‘A- Implement the ‘A5/\ algorithm. Suppose that, after a particular step, the values in the registers are X = (a0, 01,--->%18) = (101010109010101010%) Y =(yo.w,-+-.y21) = (110011001100110011001%) Z = (zo. 21, +++ 222) = (11100001119000011110000) ‘The key stream algorithm is A5/1: Keystream +Ateach step: m= maj(xs Yio Zio) + Examples: maj(0,1,0)= 0 and maj(1,1,0)= 1 +f x,= mthen Xsteps + f= H Ox OA Org + xj= pa for 1= 18,17,..-91 8d %= «If yyo= mthen Ysteps + t= oF + yp= Yea for 7= 21,20,...,1 and Yo “t «lf z= mthen Zsteps Zy@zq92 221 PF22 Fea for i= 22,21,..-,1 and 2) = 6 -Keystream bit is x;®y21972 “List the next 2 Keystream bits and give the contents of X, Y, and Z after these 2 bits have ‘been generated. eye wm = mo} (10,1) = 1 %={o\ MARS ASooee tS WN Sta \ G0 e160 «0 ae ZATZ\ WV PO OOO OSS WAV Doo S Ls 6 @0 G0 eo : =O 4 bee Aes Fa as m= may (0,81) =o ‘ 5 \ =) 010100 \0\0 V0 Jo \o\ SE =O el @oe\=9 4s as ©o WW Oo WV oo ool\at=o @\ eh Page S0f7 TCCIS| Vice Deanery of Development and Quality 5147. Using shift cipher to encrypt: “sunny day” , key = 5; the cipher text will be VXQQB GDB. Bera kiN Uooac ere a. True ¢ Ws. False Diss Eee Reason: os XZ5S 0 LFO atl Bhith bys the Massage Soe erate Sees eee 8. The key for the following cipher “ZMXNMD BZM TRD BHOGDQ” which is known to have been encrypted with a shift cipher is K=25:- ae True at b. False Reason: ake de tau atin. Tay deus, 9. The key for the following cipher K~ GOLEGABDFAUKMNEORSTUVWXYZ, ‘te enerypion forthe paints” Universi” gives MDPZMBHOGD a, True er False cow Reason: - Ty cs UMEVGRSETY 10, Alice and Bob are using the one-time pad cryptosystem. Suppose that the plaintext is 1011 0101 110 and the ciphertext is 0001 0110 111. The Key will be: va 1010 0011 001 s00\;00 AN b. 1010 1100101 Jo\s es) ie oe a4 Vere Wl soi Pecek as— . eT ane: ion 2: Fill in the blank To be answered in ( 10 ) Minutes [2:5] /_3_ Mark: A- Classify each of the following as a violation of { RED ee eee Clee D E | | Confidentiality | Integrity CBC Availability | Authentication | 1. Alice changes the amount on Bob's check from 100 to 1000 Taheqesby —~ 2. Alice uses Bob’s password to access his account Audlaaricalion— 3. Alice couldn’t access her Bank account to transfer money at 10:pm aasallabshly 4, Alice copies Bob's homework mgd CC a B- Consider the following figure and Answer the following: ‘sender sends ane eat computes the Mae with the messape 1, How does this system work with MAC to ensure data integrity? When re seader wauh be preven) aunoulherized wei a oF information, So will Sead MAC wilh message bo ee redver, aud veciver wit Compaire iF re Mac Wok vecived is Same MAc rab rave , iF iW’s qsame = ensure dala 2. Does the message received correctly? Yes or No? Explain the reason? ‘abegeibe, " yes ; because Whe reciver resived tae Same MAc nal Seader Send ib.‘To beansweredin (i) Minutes [/ ]/_4. Mae a SS TAM bea confidential email that Alice wants to send to Bob, Explain why or why not the ing sending options can be the best choice for protecting the confidentiality of Alice's At? (Note:{ ) means encrypting with public key and] means enerypting with private key) 2)Send (Mle Tositne choice Ww wah Wwe hed Onsices becouse wat Secure bySend [(MIne ie \pedd chitee, Alike Seud email wil Le sign cpm Vpseae erept bob ered encrypted by alice BN peer yard ne one caw g)Send (M1 ie) ae impossible Omeice » Send (UM ee Yao a apenibie eeiee y Woe Ewail evcrypled by Cot ope ema a oat aren neswork at aml is dite nto tree indspendet component, called Sn WLAN icatesthose nods which ar fr he eof dens. VLAN2 cons nodes Voy faulty and ther univesity taf VLAN3 cotains university servers such as web- siarer and thers The tree VALNs ae dilly connected t» gateway outer as ehee, Se ebeS ee a 14: Open question To be answered in (20) Minutes [ 5 ]/_s.Ma Oo ——————— A. Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purchases at your store. You can choose between two different systems: System A has a fraud rate of 1% and an insult rate of 5%, while System B has a fraud rate of 5% and an insult rate of 1%. 1. Which system is more secure and why? é Ne 2 Sh Sysewn N vermare secure because ne Se ete 2. Which system is more user-friendly and why? sustem Bo yrove user Pricudly » error cate 217, Be Nate a people oe ed he use Primgerpront repealed ly B. The high water mark principle and low water mark principle both apply in the realm of multilevel security (MLS). © 1 Briefly explain the high water mark principle andthe low water mark principle in the context y of MLS. Ligh water mak work with conPidinliality .ib's mean your level stack out with marimum low ley Wok you wauk Yo wed Now water mpek= evock ehh wheqcily 5 iS mean your achive \a/e\ ond Clan aemnetetEEN Scal 2. Is BellLaPadula (BLP) security model consistent with a high water mark principle, a low water mark principle, both, or neither? 2 Ye BLP wilh Wah waler marckOrinaple --a om C: A Unix password file often contains a use The file is often readable by all users (that is value improve security (including what Salih 45 wow Secced Value add Yo woke dichonany alback Use pre Computed valueoe OO] Choose the correct answer (s) and state the reason for ‘Your choice, 1. Inthe Advanced Encryption Standard (AES) cipher, “shift rows” is a step that contributes \ Confusion 4 b. Diffusion Bema occa pela on Ship behuseen Cipher auol plain | kK 2. One source of. confusion within a DES round is -- Ve S- boxes ‘b. P-boxes Reason: te 3. TEA isan example of. ciphers, Oreos] canto Key” 4. Each step of a. DES VE RCE Reason; ci SA. a. AES veo 3DES Reason: a te he wine Secure ron DES. 6. Data Encryption Standard (DES) used in Electronic Code Book (ECB) mode Ee makes it unsuitable for long messages. 4 ac True produces a keystream byte. 's a symmetric algorithm that use 112 bit keylength — SeFluave Se Mak is wore speed > produce okey ream iu byte. ty | CCIS | Vice Deanery of Development and Quality 20140514ion 5: To be answered in (15) Minutes [ |: ]/_2. Marks DEN is a Feistel block cipher based on the use of two addition operations and two substitution boxes (S-Boxs). The structure of DEN is given as follows: Substitutic \N\.000. \N.0 R yo 10 Be—— K .0000 2.2,0.0.00.0\.0.0, o Bees 4. Bea cs cae The S-Box of DEN is given as follows: (first 2 bits represent the row and the last 3 bits represent the column) [oro [oi [100 [ior [iso Jatt 00 ie wt il 10 jor 00, 10 OL i Ol o1 10 10 00 iL u [40 00 10 i 00 i o1 it i iL 10 ol in 00 a ed on the above information, encrypt the following 20-bits message (P), given the nintext = 1100010111}1110001110 y= 1110001010 rtB- The following ciphertext message was encrypted with a one-time pad is KITLKE. Using this table: \ e=000 h=001 1-010 k=011 I=100 r=101 s=110 t=111 | 1- Ifthe key is "LEKEKR" what is the plaintext? eWW clo WV loo el\ ooo
You might also like
Crypto 2012
PDF
No ratings yet
Crypto 2012
539 pages
CSS Answer Bank (Repeated Qns Only)
PDF
100% (1)
CSS Answer Bank (Repeated Qns Only)
52 pages
Materi 12-13 Network Security
PDF
No ratings yet
Materi 12-13 Network Security
114 pages
Chapter 8 Computer Networks
PDF
No ratings yet
Chapter 8 Computer Networks
53 pages
Crypto 2
PDF
No ratings yet
Crypto 2
42 pages
Css Answers
PDF
No ratings yet
Css Answers
34 pages
Css All Pyq (Till Date)
PDF
No ratings yet
Css All Pyq (Till Date)
28 pages
Crypto
PDF
No ratings yet
Crypto
41 pages
09 Crypto Intro
PDF
No ratings yet
09 Crypto Intro
46 pages
Asymmetric and Public Key
PDF
No ratings yet
Asymmetric and Public Key
106 pages
Mcqs Solved
PDF
No ratings yet
Mcqs Solved
10 pages
Cryptography Question Bank 2 and 3 UNIT
PDF
No ratings yet
Cryptography Question Bank 2 and 3 UNIT
21 pages
Honers Htcs 401 Aktu Unit2
PDF
No ratings yet
Honers Htcs 401 Aktu Unit2
19 pages
ICS 3201 - Computer Security and Cryptography - January 2022
PDF
No ratings yet
ICS 3201 - Computer Security and Cryptography - January 2022
4 pages
JPG 2 PDF
PDF
No ratings yet
JPG 2 PDF
10 pages
BSC IT 6th Sem Cyber Crime Handling Paper
PDF
No ratings yet
BSC IT 6th Sem Cyber Crime Handling Paper
12 pages
Css QB
PDF
No ratings yet
Css QB
17 pages
Is Notes
PDF
No ratings yet
Is Notes
9 pages
Information Security Answers
PDF
No ratings yet
Information Security Answers
6 pages
Cryptography of Question Answer
PDF
No ratings yet
Cryptography of Question Answer
6 pages
Cyber-Security-Lab-file - 19CS102 (Vishesh)
PDF
No ratings yet
Cyber-Security-Lab-file - 19CS102 (Vishesh)
37 pages
Lab Manual: HMR Institute of Technology & Management
PDF
No ratings yet
Lab Manual: HMR Institute of Technology & Management
30 pages
HSHSHSHBZ
PDF
No ratings yet
HSHSHSHBZ
4 pages
Infr10067
PDF
No ratings yet
Infr10067
7 pages
Computer Security - Assignment
PDF
No ratings yet
Computer Security - Assignment
5 pages
Name: - Student ID: - 392 or 6813
PDF
No ratings yet
Name: - Student ID: - 392 or 6813
11 pages
Assignment No.1
PDF
No ratings yet
Assignment No.1
5 pages
Software Design and Architecture Open Ended Lab
PDF
No ratings yet
Software Design and Architecture Open Ended Lab
4 pages
L3 (Keys) - Cyber Security
PDF
No ratings yet
L3 (Keys) - Cyber Security
48 pages
Network Security and Cryptography
PDF
No ratings yet
Network Security and Cryptography
5 pages
CSE-ND-2020-CS 8792-Cryptography and Network Security-488165205-CS8792 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
No ratings yet
CSE-ND-2020-CS 8792-Cryptography and Network Security-488165205-CS8792 CRYPTOGRAPHY AND NETWORK SECURITY
3 pages
Security and Cryptography
PDF
No ratings yet
Security and Cryptography
6 pages
Security 6
PDF
No ratings yet
Security 6
8 pages
CN TheoryBook
PDF
No ratings yet
CN TheoryBook
5 pages
Winners IT
PDF
No ratings yet
Winners IT
11 pages
III Cse Cb3491 Ccs QB Unit 2
PDF
No ratings yet
III Cse Cb3491 Ccs QB Unit 2
4 pages
Mid Semester Examination - Scheme of Evaluation: Vi - Semester B.Tech (Data Science and Engineering)
PDF
No ratings yet
Mid Semester Examination - Scheme of Evaluation: Vi - Semester B.Tech (Data Science and Engineering)
13 pages
Ccs Important Questions
PDF
No ratings yet
Ccs Important Questions
2 pages
CSE3482 FinalExam Winter2024 Solutions
PDF
No ratings yet
CSE3482 FinalExam Winter2024 Solutions
15 pages
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
PDF
No ratings yet
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
3 pages
Cns Final
PDF
100% (1)
Cns Final
59 pages
Midterm Solution
PDF
No ratings yet
Midterm Solution
10 pages
DSE 2224 21 Mar 2024
PDF
No ratings yet
DSE 2224 21 Mar 2024
7 pages
Cs8792 Cryptography and Network Security Key
PDF
No ratings yet
Cs8792 Cryptography and Network Security Key
9 pages
2014 Exam 2
PDF
No ratings yet
2014 Exam 2
6 pages
Computer Security EITA25: Final Exam in
PDF
No ratings yet
Computer Security EITA25: Final Exam in
6 pages
Cryptography Endsem 2024 6th Sem
PDF
No ratings yet
Cryptography Endsem 2024 6th Sem
4 pages
Cryptography and Network Security 2010
PDF
No ratings yet
Cryptography and Network Security 2010
4 pages
Network Security Solution Key
PDF
No ratings yet
Network Security Solution Key
5 pages
Amr Final Security2015 Solutions
PDF
No ratings yet
Amr Final Security2015 Solutions
13 pages
CS166 Midterm II Solutions 4 12 1 PDF
PDF
No ratings yet
CS166 Midterm II Solutions 4 12 1 PDF
5 pages
Model 1 C&cs 1
PDF
No ratings yet
Model 1 C&cs 1
3 pages
Final Exam
PDF
No ratings yet
Final Exam
10 pages
Exercise 5 Solution PDF
PDF
No ratings yet
Exercise 5 Solution PDF
5 pages
Crypto Mid Sem 2021
PDF
No ratings yet
Crypto Mid Sem 2021
3 pages
Assignment 2 Network Security
PDF
No ratings yet
Assignment 2 Network Security
3 pages
INTERNAL Assessment Asign1
PDF
No ratings yet
INTERNAL Assessment Asign1
2 pages
Final 17
PDF
No ratings yet
Final 17
4 pages
Siddaganga Institute of Technology, Tumkur - 572 103: Usn 1 S I ECEL26
PDF
No ratings yet
Siddaganga Institute of Technology, Tumkur - 572 103: Usn 1 S I ECEL26
2 pages