ccs unit 1 ( part 3)
ccs unit 1 ( part 3)
Ans. :
Fabrication causes Denial of service attacks. DOS
management of communication facilities. It is active attack. prevents the normal use or
Q.4 Encrypt the plaintext tobeornottobe using the
Now. vigenere cipher for the key value
Ans. AU: Dec.-20
Key Now Now Now Now
Plaintext tob eor not tob e
Ciphertext gCx rcn acp gcx r
Q.5 Let message = "Anna", and k =3, find the cipher text
using Caesar.
AU : Dec.-21
Ans. : Message = "Anna" key = 3 Cipher text = Dqgd
Q.6 What is a security mechanism ?
Ans. : A security mechanism is any process that is designed to detect,
prevent or
recover from a security attack.
Q.7 Define an attack.
Ans. : An attack on system security that derives from an intelligent threat : that is an
intelligent act that is a deliberate attempt to evade security services and violate the
security policy of a system.
Q.8 List some examples of security attacks.
Ans. : 1) Gain unauthorized access to information.
2) Disallow responsibility or liability for information the cheater did originate.
3) Enlarge cheater's legitimate license.
4) Prevent the function of software, typically by adding a convert function.
5) Cause others to violate a protocol by means of introducing incorrect
information.
Ans. : Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. Two types of passive attacks are release of message contents and traffic
analysis.
Q.10 What is an active attack?
Ans. : An active attack involves some modification of the data stream or the creation
of a false.
AU:Dec.-17
Q.11 Categorize passive and active attack.
Ans. : Active attacks can be subdivided into four types :
1. Masquerade 2. Replay 3. Modification of message 4. Denial of service
Ans. : The caesar cipher involves replacing each letter of the alphabet with the
letter
standing three places down the alphabet. The alphabet is wrapped around, so that the
letter following Z is A.
C = E(p) =(p + 3) mod (26)
The general Caesar cipher algorithm is
C= E(p) = (p + k) mode (26)
Where k takes the value in the range 1 to 25
The decryption algorithm is
p = D(C) = (C - k) mod (26)
Q.23 Define the monoalphabetic cipher.
Ans. : The playfair cipher treats the diagrams in the plaintext as single units and
translates these units into ciphertext diagrams. This algorithm is based on the use of a
5 by 5 matrix of letters constructed using keyword.
Introduction to Security
1-54
Cryptography and Cyber Security
monoalphabetic cipher and a polyalphabetic
Q.25 What is the difference between a AU: Dec.-12 CSE/IT
cipher ? alphabet is used per message. But in
Ans. : In monoalphabetic cipher single cipher
ciphertext letters for each plaintext letter, one
cipher there are nultiple
polyalphabetic
for each unique letter of keyword.
Q.26 What is product cipher ?
sequence is
roduct cipher has the performance of two or more basic ciphers in
Ans. : cryptographically stronger than any of the
Such a way that the final result or product is
component ciphers.
|AU May-13, CSE/T
Q.27 Define steganography.
hidden messages in such a way
Ans. : Steganography is the art and science of writing
suspects the existence of the
that no one, apart from the sender and intended recipient,
message, a form of security through obscurity.
Q.28 Why modular arithmetic has been used in cryptography ? AU : Dec-13, CSE/T
Ans. : Appications of modular are given to divisibility tests and to block ciphers in
cryptography. Modular arithmatic directly underpins public key system such as RSA
and Diffie-Hell man as well as providing finite fields which underlie elliptic curves and
is used in a variety of symmetric key algorithms including AES, IDEA and RC4.
Q.29 List out the problems of one time pad ? AU : Dec.-11, CSE/T
Ans. : Problem with one time pad is that of making large quantities of random keys, It
also makes the problem of key distribution and protection.
0.30 Distinguish between attack and Threat. AU: Dec.-18
Ans. :
The main difference between threat and attack is a threat can be either
intentional or unintentional where as an attack is intentional.
Threat is a circumstance that has potential to cause loss or
damage whereas
attack is attempted to cause damage.
" Threat to the information system
doesn't mean information was altered or
damaged but attack on the information system means there might be chance
to alter, damage, or obtain information when
attack was successful.
A security threat is the expressed potential for
the occurrence of an attack.
A security attack is an action taken
against a target with the intention of
doing harm.
Q.31 Specify the components of encryption algorithm or What are the ingredients of
asymmetric cipher ? AU: May-19
ing data
and wne mathenatcal
Tt deals with hioidingConicential
data to
tp aie d by
which he
a ori
bns
eadable form
hiding
lata
p
m rt
ertr
aaa
! t
Calulahon o
'ndornation into
or
t u et h n i g u e - f u 9nx
ety p l u n
ten Prolrbrg
Stuganoyaphy (eU
ic e
o nd a t ui s
h with
Orcnay,
hidden
combinod
hidig
2nth
W i t wd
nutton
be
d u t i nh
ai n can
id
a vo
data