1 CNS
1 CNS
Symmetric Asymmetric
It is a form of cryptosystem in which It is a form of cryptosystem in which
encryption and decryption performed encryption and decryption Performed
using the same key. using two keys.
Eg: DES, AES Eg: RSA, ECC
9. Define steganography
Hiding the message into some cover media. It conceals the existence of a message. this
is different from cryptography, which hides the meaning of a message but does not hide the
message itself.
22. Define Euler's totient function or phi function and their applications?
The Euler's totient function states that it should be clear for a prime number p,
ɸ (p) = p-1
23. Describe in general terms an efficient procedure for picking a prime number?
The procedure for picking a prime number is as follows:
1.Pick an odd integer n at random (eg., using a pseudorandom number generator).
2.Pick an integer a<n at random.
3.Perform the probabilistic primality test, such as Miller-Rabin. If n fails the test,
reject the value n and go to step 1.
4.If n has passed a sufficient number of tests, accept n; otherwise , go to step 2.
*Simplicity.
8. What is Triple Encryption? How many keys are used in triple encryption?
Triple Encryption is a technique in which encryption algorithm is performed
three times using three keys.
5. Knowledge of the algorithm plus one of key plus samples of ciphertext must be
insufficient to determine the other key.
10. What are the principle elements of a public key cryptosystem?
The principle elements of a cryptosystem are:
1.plain text
2.Encryptionalgoritm
3.Public and private key
4.Cipher text
5.Decryption algorithm
16. List four general characteristics of schema for the distribution of the public key?
The four general characteristics for the distribution of the public key are
1. Public announcement
2. Publicly available directory
3. Public-key authority
4. Public-key certificate
20. Perform encryption and decryption using RSA Alg. for the following.
P=7; q=11; e=17; M=8.
Soln:
n = pq
n = 7*11=77
ii)(n)=(p-1) (q-1)
=6*10 = 60
e =17
d =27
C= Me mod n
C = 817 mod 77
= 57
M = Cd mod n
= 5727 mod 77
=8
12. What is the difference between weak and strong cohision resistance?
Weak collision resistance Strong resistance collision
For any given block x, it is computationally It is computationally infeasible to find
infeasible to fine 34x with H(y)=H(x). any pair (x,y) such that H(x)=H(y)
1. Define Kerberos.
Kerberos is an authentication service developed as part of project Athena at MIT.
The problem that Kerberos address is, assume an open distributed environment in which
users at work stations wish to access services on servers distributed throughout the
network.
5. Assume the client C wants to communicate server S using Kerberos procedure. How can it
be achieved?
Dialogue between client 'C' , server 'S' and authentication server(AS) are given
below
a)C AS: [IDc || Pc || IDs]
b)A S C: Ticket
Step 1: The user logon to workstation and request access to the server S. The
client module C in the workstation request user password and sends message to AS that
includes user ID(IDc), server ID(IDc) and its password.
Step 2: Now the AS verify users password against its password database, if it is valid. AS
sends the ticket to C that includes user ID(IDc), server ID(IDs) and the address of the
client workstation (ADc) are encrypted with key which is shared by both AS and
server(S).
Step 3: Now the client use the ticket to sere :.,' S, to send the message to S with DX to
access service.
Mostly used issue X.509 certificate with the product name" Verisign digital
id". Each digital id contains owner's public key, owner's name and serial number of the
digital id.
15. Define Intrusion detection and Give the intrusion detection techniques.
It is the act of detecting unwanted traffic on a network or a device.
Intrusion detection techniques:
1. Threshold detection
2. Anomaly detection
3. Rule based detection
19. What are the effects of malicious software? Write any two.
The generic term for threats is malicious software or malware. Malware is software
designed to cause damage to or use up the resource of a target computer.
Ex. Trap Door and Trojan Horse.
c) Private keys.
d) Pass phrase based conventional keys.
9. Define S/MIME?
26. What are the different between SSL version 3 and TLS?
SSL TLS
* In SSL the minor version is 0 and * In TLS, the major
version is 3 and the
the major version is 3 minor version is 1.
* SSL use HMAC alg., except that * TLS makes use of the
same alg.
the padding bytes concatenation.
* SSL supports 12 various alert codes. * TLS supports all of the
alert codes defined in
SSL3 with the exception
of no _ certificate.
PART – B
UNIT I – INTRODUCTION AND NUMBER THEORY