CSS UT2 QB Ans
CSS UT2 QB Ans
Stateful inspection firewalls: This type of firewall keeps track of the state of network
connections and examines the entire packet rather than just the header. This allows
stateful inspection firewalls to filter traffic based on more advanced criteria, such as
the contents of the packet or the application that generated the packet.
Step-1: The authentication server receives the request by the client and verifies that
client
Step-2: upon the verification a timestamp is created with current time in user session
and expiration date
Step-3: The key is sent back to the client in the form of TGT (Ticket Granting Ticket)
Step-4: The client submits the TGT to TGS to get authenticated
Step-5: The TGS creates an encrypted key with a time stamp and grants the client
service ticket
Step-6: The client decrypts the ticket and sends acknowledgement to the TGS
Step-7: Then it sends its own encrypted key to the service server. The service server
decrypts the key and checks the time stamp whether it is valid or not. If it is valid then
it contacts the KDC and returns session to the client
Step-8: The client decrypts the ticket. If the key is still valid communication is initiated
between the client and the server. Now the client is authenticated until session
expires
Q) Digital Signature.
Digital signatures are the public-key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed
messages. They are used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital
data. This binding can be independently verified by receiver as well as any third party.
Digital signature is a cryptographic value that is calculated from the data and a secret
key known only by the signer.
In real world, the receiver of message needs assurance that the message belongs to
the sender and he should not be able to repudiate the origination of that message.
This requirement is very crucial in business applications, since likelihood of a dispute
over exchanged data is very high.