Network Security and Cryptography
Network Security and Cryptography
Access Control:
Access control is a security mechanism that restricts and regulates who or what can view or use
resources in a computing environment. It ensures that only authorized individuals or systems can access
specific data or functionalities. It is commonly implemented using authentication (e.g., passwords,
biometrics) and authorization (e.g., role-based access control).
For example, if a server is down due to maintenance, it is an availability issue, whereas if unauthorized
users are blocked from accessing confidential data, it is an access control measure.
Active attacks involve an attacker modifying data or disrupting network operations. Common types
include:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 1/5
Prevention Measures: Using encryption, firewalls, intrusion detection systems (IDS), and multi-factor
authentication (MFA).
2. (a) State the Diffie-Hellman Key Exchange algorithm. Write down the limitations
of it.
It allows two parties to securely share a cryptographic key over an insecure channel.
Steps:
Limitations:
Triple DES (3DES) applies the DES encryption algorithm three times to each data block. The key can be
used in the following ways:
1. Three Independent Keys (K1, K2, K3) – Strongest but requires more memory.
2. Two-Key (K1 = K3, K2 is different) – Reduces key size while maintaining security.
3. Same Key for All Three Stages (K1 = K2 = K3) – Effectively same as single DES and considered
weak.
RSA Algorithm:
RSA is an asymmetric encryption algorithm using public and private keys for secure communication.
Steps:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 2/5
Encryption:
Ciphertext C = M e mod n.
Decryption:
Plaintext M = C d mod n.
Example:
Let p = 3, q = 11, then n = 33 and ϕ(n) = 20.
Choose e = 7 (as gcd(7,20) = 1).
Find d, such that 7d ≡ 1 mod 20, which gives d = 3.
If M = 2,
Ciphertext C = 27 mod 33 = 128 mod 33 = 29.
Decryption: M = 293 mod 33 = 2 (original message).
Why Required?
A digital signature is an encrypted value that verifies data authenticity and sender identity. It is
generated using a private key and verified with a public key.
Importance:
5. (a) Write down limitations of the Caesar Cipher technique. How can we overcome
it?
Limitations:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 3/5
Overcoming It:
5. (b) Transform "UNIVERSITY" into cipher text using Modified Caesar Cipher
technique.
U→X
N→Q
I→L
V→Y
E→H
R→U
S→V
I→L
T→W
Y→B
Ciphertext: "XQLYHUVLWB"
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 4/5
Feature AES DES
This detailed explanation and solution set should help clarify each question. Let me know if you need
further elaboration! 🚀
I have converted your detailed explanation into a DOCX file. You can download it from the link below.
The DOCX file has been created. You can download it using the link below:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 5/5