Answer
Answer
SECTION - A
1. Why is asymmetric cryptography bad for huge data? Specify the reasons
2. Calculate n, φ(n), and d such that d*e ≡ 1 (mod φ(n)) for the following values of
p=7 and q=5.
SECTION B
11 A) Prove Fermat's theorem and Euler's theorem.
B) Describe RSA algorithm & Perform encryption and decryption using RSA
algorithm for the following: p=7, q=11, e=7, M=49
12 A) Explain the format of the X.509 certificate in detail.
The X.509 certificate is encoded using the ASN.1 (Abstract Syntax Notation One)
standard and typically represented in DER (binary) or PEM (Base64-encoded)
formats. Its structure includes the following main components:
Certificate Header
1. Version (v1, v2, v3):
o Specifies the version of the X.509 standard (v3 is the most common).
2. Typically includes:
o Common Name (CN): CA name
o Organization (O)
o Country (C)
3. Validity Period
Defines the time frame during which the certificate is valid.
o Not Before: Start date and time.
o Not After: Expiry date and time.
4. Subject Information
Identifies the entity (person, organization, or device) to whom the certificate is issued.
Hash Function:
A hash function takes an input (or 'message') and returns a fixed-size string of bytes,
which is typically a digest that uniquely represents the input.
SHA-2 Family:
SHA-2 includes several variants:
SHA-224: Produces a 224-bit hash.
SHA-256: Produces a 256-bit hash (the most commonly used).
SHA-384: Produces a 384-bit hash.
SHA-512: Produces a 512-bit hash.
Each version of SHA-2 differs in the output size, but they all share similar design
principles.
Features:
Deterministic: Given the same input, the output hash will always be the same.
Fixed-size output: SHA-256 always outputs a 256-bit hash, regardless of the input
size.
Collision resistance: It is computationally difficult to find two different inputs that
produce the same hash.
Pre-image resistance: Given a hash output, it is computationally difficult to reverse
the process and find the original input.
Avalanche effect: A small change in the input results in a significantly different hash
value. For example, even changing one character in a document will result in an
entirely different hash.
Widely used: SHA-2 is extensively used in various cryptographic protocols,
including:
SSL/TLS: For securing communications over the internet.
Digital Signatures: For signing documents, emails, etc.
Blockchain: SHA-256 is the basis for Bitcoin’s mining algorithm and other
cryptocurrencies.
Applications:
SHA-2 is used in digital certificates, software distribution, VPNs, disk encryption,
and digital forensics, among others
13 .A) Explain PKI management model and its operations with the help of a diagram .
PKI (Public Key Infrastructure) is a set of roles, policies, and procedures used to
manage digital keys and certificates to facilitate secure communication and
transactions. It plays a crucial role in ensuring the confidentiality, integrity, and
authenticity of data. PKI is built on public-key cryptography and aims to make
encryption accessible for secure data exchange over the internet.
Client Requests Service Ticket: With the TGT in hand, the client sends a request to
the Ticket Granting Server (TGS). The request includes the TGT and specifies the
service the client wants to access.
TGS Authentication: The TGS verifies the TGT. If valid, it issues a Service Ticket
(ST) for the requested service, along with a session key for communication between
the client and the service.
Client Requests Service: The client now sends the Service Ticket to the target service,
which is the server hosting the requested service.
Server Verifies Ticket: The server decrypts the Service Ticket using its own secret
key, and if valid, grants the client access to the requested service. At this point, both
the client and server can communicate securely using the session key.
The TGT serves as the client’s proof of authentication. Once the client is
authenticated by the Authentication Server, it receives a TGT, which contains:
o The client’s identity.
o The client’s session key for encrypted communication with the TGS.
3. Service Ticket
After obtaining a TGT, the client can request a Service Ticket from the Ticket
Granting Server. The Service Ticket is:
o Issued for a specific service the client wants to access.
o Encrypted with the service’s secret key, ensuring that only the service can
decrypt it and authenticate the client.
4. Session Keys
Session keys are temporary encryption keys used for secure communication
between the client and the service. The KDC generates session keys for each
service ticket to ensure confidentiality and integrity during the session.
5. Expiration and Renewal
Kerberos tickets, including TGTs and Service Tickets, have expiration times to
enhance security. Tickets that have expired are no longer valid, and the client
must request new tickets.
Wireless security is the protection of networks, systems, and devices from unauthorized
access and attacks in wireless communication. Since wireless networks are based on radio
frequencies, which are broadcast over the air, they are more prone to interception and
intrusion than wired networks.
1. Eavesdropping: Attackers intercept data packets transmitted over the air. Tools like
packet sniffers allow attackers to capture and analyze data.
2. Man-in-the-Middle (MitM) Attacks: Attackers intercept and possibly alter the
communication between two parties. This can occur in insecure networks, especially
public Wi-Fi.
3. Rogue Access Points: Unauthorized access points that appear as legitimate network
points, but are controlled by attackers. These rogue devices can steal user credentials
and data.
4. Denial-of-Service (DoS) Attacks: Attackers flood the wireless network with
excessive traffic, preventing legitimate users from accessing the network.
B) Explain in detail about the classification of cybercrimes.
Cybercrime refers to illegal activities that involve the use of computers or the internet,
typically for financial or personal gain. It includes offenses like hacking, online fraud,
identity theft, and more. Cybercrime affects individuals, organizations, and even
governments.
Cybercrimes can be categorized based on the nature of the attack and the target of the crime.
Below is a detailed classification:
1. Computer-Related Crimes:
2. Computer-Targeted Crimes:
3. Content-Related Crimes:
4. Cyberterrorism:
Common Cybercrimes:
Cybercrime refers to illegal activities that involve the use of computers or the internet,
typically for financial or personal gain. It includes offenses like hacking, online fraud,
identity theft, and more. Cybercrime affects individuals, organizations, and even
governments.
Common Cybercrimes:
B)Describe briefly about the spywares that are used to launch cybercrimes.
Spyware is a type of malicious software designed to secretly monitor and collect user data,
often to commit fraud, identity theft, or other criminal activities. Spyware can monitor
internet activity, collect passwords, and track keystrokes without the user's knowledge.
Types of Spyware:
1. Adware:
o Description: Display ads or redirect web traffic to sites that generate ad
revenue for the attacker. Though not always malicious, it can slow down the
system and cause unwanted distractions.
o Example: Software that displays intrusive advertisements on a user’s
computer without permission.
2. Trojans:
o Description: Malicious software that masquerades as legitimate programs but
performs harmful actions once installed. These can act as spyware by sending
user data to a remote attacker.
o Example: A file disguised as a useful software program but secretly sends
sensitive data to an attacker.
3. Keyloggers:
o Description: As discussed earlier, keyloggers capture all the keystrokes
entered by a user, including passwords and private information.
o Example: A software keylogger capturing login credentials for banking
accounts.
4. System Monitors:
o Description: Software that monitors user activity, records browsing habits,
emails, and social media interactions, and sends the collected data to third
parties.
o Example: A system monitoring tool that tracks user behavior on websites and
sends this data to advertisers.
Identity Theft: By recording sensitive information like credit card numbers, spyware
enables identity theft.
Data Harvesting: Spyware can collect personal information for use in phishing
attacks or selling it on the dark web.
Financial Fraud: Spyware can capture bank account credentials to carry out
unauthorized transactions.
Countermeasures: