Network Security
Network Security
SHORT QUESTIONS
1 What is Cryptography?
Cryptography is the practice of securing information through encryption techniques.
2 What is Steganography?
Steganography hides information within other non-secret data like images or audio
files.
12 What is Authentication?
Authentication verifies user identity using passwords, biometrics, or digital
certificates.
LONG QUESTIONS
1 Substitution Cipher
Irreversible, meaning the original input cannot be derived from the hash.
3 Hybrid Cryptosystem
The sender signs the message with their private key, and the receiver verifies it
with the sender’s public key.
Implemented using RSA, DSA, or ECC for secure authentication and non-
repudiation.
UNIT 2
SHORT QUESTIONS
1 Intermediate protocols
3 Subliminal channel
4 Signatures
5 Bit commitment
– A cryptographic protocol where one party commits to a value while keeping it
hidden until later revelation, ensuring fairness in protocols like coin flipping.
7 Mental poker
8 Key escrow
– A digital signature scheme where the signer does not see the message content, used
in privacy-focused applications like e-voting and digital cash.
11 Secret elections
12 Anonymous messaging
LONG QUESTIONS
1 Time Stamping
Time stamping ensures the authenticity and integrity of a document by
recording the exact time of creation or modification.
2 Subliminal Channels
3 Advanced Protocols
UNIT 3
SHORT QUESTIONS
1 Key Length
4 Store Backup
– Ensures data recovery in case of loss or corruption.
5 Destruction
– Various encryption methods and modes (e.g., block vs. stream ciphers) define
security and performance.
– A simple block cipher mode prone to pattern leaks, making it less secure.
10 Stream Ciphers
– Encrypt data one bit or byte at a time, suitable for real-time applications.
11 Self-synchronizing
– A cipher mode that can recover from data loss by synchronizing with previous
ciphertext.
12 Output feedback
– A block cipher mode converting a block cipher into a stream cipher for added
security.
– Enhances encryption by turning a block cipher into a secure stream cipher using
counters.
LONG QUESTIONS
1 Algorithm Types
Symmetric Algorithms – Use a single key for encryption and decryption (e.g.,
AES, DES).
Asymmetric Algorithms – Use a public-private key pair (e.g., RSA, ECC).
Algorithm Modes
Fast and simple but not recommended for securing sensitive data.
Each plaintext block is XORed with the previous ciphertext block before
encryption.
Public Key Encryption: Uses a pair of keys (public & private), is slower but
ensures secure key exchange.
Communication Channels:
UNIT 4
SHORT QUESTIONS
1 Information theory
2 Complexity theory
3 Number theory
– Breaking large numbers into prime factors is key to attacking RSA encryption.
5 DBS
6 Description
9 DB Vacancy
– Could relate to gaps in database security or job openings in database security roles.
11 Linear congruential
LONG QUESTIONS
1 INFORMATION THEORY
Data Compression - Reduces the size of data for efficient storage and
transmission.
2 COMPLEXLY THEORY
3 NUMBER THEORY
Prime Numbers - Numbers greater than 1 with only two divisors: 1 and itself.
Greatest Common Divisor (GCD) - The largest number that divides two or
more numbers without leaving a remainder.
Fermat’s Little Theorem - States that if pp is a prime, then ap≡a (mod p)a^p
\equiv a \ (\text{mod} \ p) for any integer aa.
Key Size Limitation – DES uses a 56-bit key, making it vulnerable to brute-
force attacks.
Weak Key Susceptibility – Certain keys in DES can create weak encryption
patterns.
Countermeasures – Modern ciphers, like AES, use complex S-boxes and key
scheduling to resist both attacks.
DES Vulnerability – Both methods were used to analyze DES, leading to its
eventual deprecation in favor of stronger encryption schemes.
UNIT 5
SHORT QUESTIONS
1 One-way hash functions
– Cryptographic functions that convert input data into a fixed-length hash, ensuring
integrity and security.
– A family of cryptographic hash functions (SHA-1, SHA-2, SHA-3) used for digital
signatures and integrity verification.
– Encryption systems (like RSA, ECC) that use separate public and private keys,
enabling secure communication.
5 Backgrounders
7 IBM
9 Kerberos (v.imp)
– Refers to encryption mechanisms that ensure secure data storage and transmission.
LONG QUESTIONS
1 PUBLIC KEY ALGORITHM
A cryptographic system that uses two keys: a public key for encryption and a private
key for decryption.
Advantage – Eliminates the need for securely sharing secret keys, unlike
symmetric encryption.
2 Background of Digital Signature
Uses Public Key Cryptography – A private key is used to sign, and a public
key is used to verify.
Key Generation – Generates a private key for signing and a public key for
verification.
Signing Process – A hash of the message is encrypted with the private key to
create a signature.
Verification – The recipient decrypts the signature using the public key to
validate authenticity.
IBM Products with Kerberos – Used in IBM WebSphere, AIX, and other
enterprise security frameworks.
Key Exchange Steps – Both parties agree on a prime number and a base,
generate private keys, compute public keys, and derive a shared secret.