ISP-QnA - ANSWERS
ISP-QnA - ANSWERS
Confidentiality: The principle of confidentiality specifies that only the sender and the intended
recipient(s) should be able to access the contents of a message. Confidentiality gets compromised if an
unauthorized person is able to access a message. Here, the user of computer A sends a message to the user
of computer B. Another user C gets access to this message, which is not desired, and therefore defeats the
purpose of confidentiality. An example of this could be a confidential email message sent by A to B,
which is accessed by C without the permission or knowledge of A and B. This type of attack is called
interception. Interception causes loss of message confidentiality
• Reverse Cipher uses a pattern of reversing the string of plain text to convert as cipher text.
• The process of encryption and decryption is same.
• To decrypt cipher text, the user simply needs to reverse the cipher text to get the plain text.
The major drawback of reverse cipher is that it is very weak. A hacker can easily break the cipher
text to get the original message. Hence, reverse cipher is not considered as good option to maintain
secure communication channel,.
What is firewall?
A Firewall is a security solution for the computers or devices that are connected to a network, they can
be either in form of hardware as well as in form of software. It monitors and controls the incoming and
outgoing traffic (the amount of data moving across a computer network at any given time ). The major
purpose of the network firewall is to protect an inner network by separating it from the outer network.
Inner Network can be simply called a network created inside an organisation and a network that is not
in the range of inner network can be considered as Outer Network.
Cipher : The formulas used to encode and decode messages are called encryption algorithms
Key : The variable, which is called a key, is what makes a cipher's output unique
Historically, it was used by militaries and governments.
In modern times, encryption is used to protect data stored on computers and storage devices, as well as
data in transit over networks
3. The network layer, also called the internet layer, deals with packets and
connects independent networks to transport the packets across network
boundaries. The network layer protocols are IP and Internet Control Message
Protocol, which is used for error reporting.
4. The physical layer, also known as the network interface layer or data link layer,
consists of protocols that operate only on a link -- the network component that
interconnects nodes or hosts in the network. The protocols in this lowest layer
include Ethernet for local area networks and Address Resolution Protocol.
Uses of TCP/IP
TCP/IP can be used to provide remote login over the network for interactive file transfer to
deliver email, to deliver webpages over the network and to remotely access a server host's
file system. Most broadly, it is used to represent how information changes form as it
travels over a network from the concrete physical layer to the abstract application layer. It
details the basic protocols, or methods of communication, at each layer as information
passes through.
Explain RSA algorithm
- RSA : Rivest Shamir Adleman Algorithm
- Asymmetric Key Algorithm i.e. keys shared across will differ - TwoKeys: Public and Private Key
- Public Key: Given to everyone
- Private Key: Kept Private
- 2 large prime numbers are used for public key
- Private key is also derived using 2 large prime numbers
- If the key turns is factored then, the key is compromisedSteps:
1. Choose 2 prime numbers p and q
2. Compute the values of n and phin = p xq
phi = (p-1) x (q-1)
To compute value of d:
Form a table with four columns a,b,d,k
such that p is a prime number and q is a generator of p The generator q is a number that, when raised to
positive whole-number powers less than p, never produces the same result forany two such whole numbers
The value of p may be large but the value of q is usually small.
Explain Rail Fence algorithm
The rail-fence technique is an example of transposition. It uses a simple algorithm as shown in Fig.
2.35.
Let us illustrate the rail-fence technique with a simple example. Suppose that we have a plain-text
message :Come home tomorrow. How would we transform that into a cipher-text message using the
rail-fence technique? This is shown in Fig. 2.36.
As the figure shows, the plain-text message ‘Come home tomorrow’ transforms into ‘Cmhmtm- rooeoeoorw’
with the help of rail-fence technique.
Rail-fence technique involves writing plain text as a sequence of diagonals and then reading itrow by
row to produce cipher text.
It should be quite clear that the rail-fence technique is quite simple for a cryptanalyst to break into. It
has very little sophistication built in.
Attempts to involve some modificationof the data or Attempts to learn or make use of information from the
can be used for creating a false system system but doesaffect the resources
Such attacks are easier to detect Such attacks are difficult to detect
For government organizations: compromised data can mean exposing highly confidential information to
foreign parties. Military operations, political dealings, and details on essential national infrastructure can
pose a major threat to a government and its citizens.
For individuals: identity theft is a major threat to data breach victims. Data leaks can reveal everything
from social security numbers to banking information. Once a criminal has these details, they can engage in
all types of fraud under your name. Theft of your identity can ruin your credit, pin you with legal issues,
and it is difficult to fight back against.
Let us apply the Vernam cipher algorithm to a plain-text message HOW ARE YOU using a one-time pad
NCBTZQARX to produce a cipher-text message UQXTRUYFR as shown in Fig. 2.42.
It should be clear that since the one-time pad is discarded after a single use, this technique is highly secure and
suitable for small plain-text message, but is clearly impractical for large messages. The Vernam Cipher
was first implemented at AT&T with the help of a device called the Vernam machine.
Vernam Cipher uses a one-time pad, which is discarded after a single use, and therefore, issuitable only for
short messages.
Classify IDS
- Classification of Intrusion Detection System:
IDS are classified into 5 types:
1. Network Intrusion Detection System (NIDS):
Network intrusion detection systems (NIDS) are set up at a planned point within the network to
examine traffic from all devices on the network. It performs an observation of passing traffic on the
entiresubnet and matches the traffic that is passed on the subnets to the collection of known attacks.
Once an attack is identified or abnormal behaviour is observed, the alert can be sent to the
administrator. An example of a NIDS is installing it on the subnet
where firewalls are located in order to see if someone is trying tocrack the firewall.
2. Host Intrusion Detection System (HIDS):
Host intrusion detection systems (HIDS) run on independent hosts or devices on the network. A
HIDS monitors the incoming and outgoing packets from the device only and will alert the
administrator if suspicious or malicious activity is detected. It takes a snapshot of existing system files
and compares it with the previous snapshot. Ifthe analytical system files were edited or deleted, an
alert is sentto the administrator to investigate. An example of HIDS usage can beseen on mission-
critical machines, which are not expected to change their layout.
3. Protocol-based Intrusion Detection System (PIDS):
Protocol-based intrusion detection system (PIDS) comprises a system or agent that would
consistently resides at the front end of a server, controlling and interpreting the protocol between a
user/ device and the server. It is trying to secure the web server by regularly monitoring the HTTPS
protocol stream and accept the related HTTP protocol. As HTTPS is un-encrypted and before
instantlyentering its web presentation layer then this system would need to reside in this interface,
between to use the HTTPS.
4. Application Protocol-based Intrusion Detection System (APIDS):
Application Protocol-based Intrusion Detection System (APIDS) is a system or agent that generally
resides within a group of servers. Itidentifies the intrusions by monitoring and interpreting the
communication on application-specific protocols. For example, this would monitor the SQL protocol
explicit to the middleware as it transacts with the database in the web server.
5. Hybrid Intrusion Detection System :
Hybrid intrusion detection system is made by the combination of two or more approaches of the intrusion
detection system. In the hybridintrusion detection system, host agent or system data is combined with
network information to develop a complete view of the network system. Hybrid intrusion detection system
is more effective in comparison to the other intrusion detection system. Prelude is an example of Hybrid
IDS.
Number of
header fields 12 8
Length of
header filed 20 40
2001:0db8:0000:0000:0000:ff
Example 12.244.233.165
00:0042:7879
VLSM IPv4 support VLSM (VariableLength IPv6 does not offer supportfor VLSM.
support Subnet mask).
Routing
RIP is a routing protocolsupported by
Information RIP does not support IPv6.It uses
the routed daemon.
Protocol (RIP) static routes.
Packet
Allows from routers andsending
fragmentation Sending hosts only
host
Local subnet
Group Internet Group ManagementProtocol Multicast Listener
management GMP) Discovery (MLD)
Does not have optionalfields.
Optional
Has Optional Fields But Extension headers are
Fields
available.
Dynamic host Clients have approach DHCS (Dynamic A Client does not have to approach any
configuration Host Configurationserver) whenever such server asthey are given permanent
Server they want to connect to a network. addresses.
UDP Header –
UDP header is an 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to 60 bytes. The
first 8 Bytes contains all necessary header information and the remaining part consist of data. UDP port
number fields are each 16 bits long, therefore the range for port numbers is defined from 0 to 65535; port
number 0 is reserved. Port numbers help to distinguish different user requests or processes.
1. Source Port: Source Port is a 2 Byte long field used to identify theport number of the source.
2. Destination Port: It is a 2 Byte long field, used to identify the
port of the destined packet.
3. Length: Length is the length of UDP including the header and thedata. It is a 16-bits field.
4. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s
complement of the one’s complement sum of the UDP header, the pseudo-header of
information from the IP header, and the data,
padded with zero octets at the end (if necessary) to make a multipleof two octets.
Notes – Unlike TCP, the Checksum calculation is not mandatory in UDP. No Error control or flow control is
provided by UDP. Hence UDP depends on IPand ICMP for error reporting.
4. Non-Repudiation: There are situations where a user sends a message, and later on
refuses that she had sent that message. Non-repudiation does not allow the sender of
a message to refute the claim of not sending that message. For instance, user A could
send a funds transfer request to bank B over the Internet. After the bank
performs the funds transfer as per A’s instructions, A could claim that he/she never
sent the funds transfer instruction to the bank! Thus, A repudiates, or denies, his/her
funds transfer instruction.
Interception,Fabrication,Modification,Interpution
Since DES is based on the Feistel Cipher, all that is required to specify DES is −
• Round function
• Key schedule
• Any additional processing − Initial and final permutation