CNS QB
CNS QB
Confidentiality and privacy are one and the same. This facet of the security
triangle focuses on keeping sensitive data away from unauthorized parties. A
commitment to confidentiality means organizations in possession of vast amounts
of information must adopt practices specifically built around safeguarding that
information. It may very well call for a special training program that educate
access-carrying employees across all departments on the best practices in password
protection, social engineering, and other topics that are imperative to cyber
security.
Integrity is all about ensuring the quality and consistency of data .Ensuring
integrity can be as simple as creating policies that dictate which users have access
to certain information and who has what level of file privileges.
Availability is the CIA facet that arguably demands the most from an
organization. In a nutshell, it entails the ongoing process of doing whatever is
necessary to keep all hardware and software components up and running.
17. What are the classical encryption techniques?
1. SUBSTITUTION TECHNIQUES
Caesar Cipher
Monoalphabetic Ciphers
Play fair Cipher
Hill Cipher
1 2 3 4 5 6 7 8 9 10 11 12
C - M - T - M - R - O -
- O - E - O - O - R - W
Now read the characters diagonally, We get the plain text COME TOMORROW
27. Apply Miller Rabin primality testing to determine whether 221 is prime.
To check whether the given number is prime n = 221
Step : 1 Find n-1 Here n – 1 = 220
Step : 2 Choose integers k and q. such that K > 0 and q is an odd integer such
that 2 k q = n-1 . Here k = 2 q = 55 ( since 2 2 * 55 = 220)
Step : 3 Choose random integer a such that 1 < a < (n-1) Here a = 5
Step : 4 Compute a q mod n = 1 and check whether it is equal to 1 or (n-1)
ie) 1 or 220 Here 5 55 mod 221 = 112
Step : 5 Continue the test with j = 0 to k – 1 find ( a 2 ) jq mod n ≡ n -1
Here J = 0 & 1
mod n = 5 2(0*55) mod 221 = 5 ≠ 1, n – 1
mod n = 5 2(1*55) mod 221 = 168 ≠ 1, n – 1
This shows 221 is composite.
But suppose we had selected a = 21. Then we have 2155 mod 221 = 200;
(2155)2 mod 221 = 220; and the test returns inconclusive. ie) May be prime.
[Note : The value of - ‘a’ is between 2 to 219 . and these 4 – values 21, 47, 174, and 200
yield inconclusive. ]
28. Why modular arithmetic has been used in cryptography?
Modular Arithmetic
A kind of integer arithmetic that reduces all numbers to one of a fixed set [0 ... n -1] for
some number n. Any integer outside this range is reduced to one in this range by
taking the remainder after division by n.
Purpose of modular arithmetic in cryptography
Modular arithmetic allows us to easily create groups, rings and fields which are
fundamental building blocks of most modern public-key cryptosystems. Ex :
Diffie-hellman
The fundamental operation of combining a key stream with a plain bit stream at
the binary level is XORing them together. This is the same as addition modulo 2.
Modern public cryptography has lots of modular-arithmetic protocols RSA.
Repeatedly calls for raising numbers to exponents modulo various other
numbers.
29. What is discrete logarithm problem?
Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that
ax ≡ b (mod p) is called the discrete logarithm problem.
30. Why random numbers are used in network security?
Solution :
To find x :
-------------- (1)
S2 = 1
Here n = 3
x = 2 * 35 * 2 + 3 * 21 * 1 + 2 * 15* 1 = 140 + 63 + 30 = 233
x = 233
X ≡ 1 mod 5
X ≡ 2 mod 7
X ≡ 3 mod 9
X ≡ 4 mod 1
a1=1
a2=2
a3=3
a4=4
n1=5
n2=7
n3=9
n4=11
M=n1n2n3n4
M=5*7*9*11=3465
mi=M/ni
m1=3465/5=693
m2=3465/7=495
m3=3465/9=385
m4=3465/11=315
miyi=1 mod ni
693y1=1 mod 5
y1=2 mod 5
495y2= 1 mod 7
y2=3 mod 7
385y3=1 mod 9
y3=4 mod 9
x=(a1m1y1+a2m2y2+ a3m3y3)mod M
=((1*693*2)+(2*495*3)+(3*385*4)+(4*315*8)) mod 3465
=19056 mod 3465
=1731
4. Describe : i) Play fair cipher ii) Rail fence cipher iii) Vignere cipher.
EUCLID(a, b)
1. A a; Bb
2. if B = 0 return A = gcd(a, b)
3. R = A mod B
4. AB
5. BR
6. goto 2
Example
gcd(55, 22) = gcd(22, 55 mod 22) = gcd(22, 11) = 11
gcd(18, 12) = gcd(12, 6) = gcd(6, 0) = 6
1. The addition and multiplication tables are symmetric about the main
diagonal, in conformance to thecommutative property of addition and
multiplication. This property is also exhibited in Table , which uses mod
8 arithmetic.
2. All the nonzero elements defined by the following
Table have a multiplicative inverse, unlike the case with Table
3. The scheme defined by the following Table satisfies all the requirements for a finite
field. Thus, we can refer to this schemeas GF(23).
4. For convenience, we show the 3-
3. State the difference between private key and public key algorithm.
One of the 2 keys must be kept secret The key must be kept secret
and the other is public.
It is impossible to decipher a message if It is impossible to decipher a message if no
no other information is available other information is available
4. Give the five modes of operation of block cipher.
Electronic Codebook Mode
Cipher Block Chaining Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
5. Give the problems in symmetric key cryptography.
The first problem is that of key agreement or key distribution
The second problem is the same key is used for encryption and decryption one key
per communication parties is required.
If there are n – users , total of n(n-1)/2 keys are required.
RSA : Algorithm
Block cipher asymmetric algorithm developed by Rivest, Shamir & Adleman .
It is the best known & widely used public-key scheme and based on
exponentiation in a finite (Galois) field over integers modulo a prime.
Each user will be provided with pair of keys one of which is public key used for
encryption and the other is private used for decryption.
Plaintext and cipher text are integers between 0 and n – 1 for some n. (eg . 1024
bits)
RSA Algorithm :
RSA Example
1. Select primes: p=7 & q=11
2. Compute n = pq =7×11=77
3. Compute ø(n)=(p–1)(q-1)=6×10=60
4. Select e : gcd(e,60)=1; choose e=17
5. Determine d: de=1 mod 60 and d < 60
Now, we need to compute d = e-1 mod f(n) by using backward substitution of GCD
algorithm:
According to GCD:
60 = 17 * 3 + 9
17 = 9 * 1 + 8
9=8*1+1
8=1*8+0
Therefore, we have:
1=9–8
= 9 – (17 – 9)
= 9 – (17 – (60 – 17 * 3))
= 60 – 17*3 – (17 – 60 + 17*3)
= 60 – 17 *3 + 60 – 17*4
= 60*2 – 17*7
Hence, we get d = e mod f(n) = e mod 60 = -7 mod 60 = (53-60) mod 60 = 53
-1 -1
So, the public key is {17, 77} and the private key is {53, 77}, RSA encryption and
decryption is following:
Encryption Decryption
Plaintext cipher text Plaintext
8 57 8
The result is that the two sides have exchanged a secret value.
Ex : ὰ = 3 XA = 97 and XB = 233
A computes YA = 397 mod 353 = 40.
B computes YB = 3233 mod 353 = 248.
After they exchange public keys, each can compute the common secret key:
A computes K = (YB)XA mod 353 = 24897 mod 353 =160.
B computes K = (YA)XB mod 353 = 40233 mod 353 = 160.
4. Describe DES algorithm with neat diagram and explain the steps.(Apr/May’17)
5. Write about the various mechanisms in Public key cryptography techniques.
6. Explain Triple DES in detail with suitable diagram
Public Key = PB = nB * G
– Alice takes plaintext message, M, and encodes it onto a point, PM, from
the elliptic group.
Decryption : by Bob
Take the first point from Cm - KG
Multiply KG and private key of Bob : Product = nB KG
Take the second point from Cm and subtract the product from it
Pm + KPB - nB KG
Substitute PB = nB * G Then Pm + K nB * G - nB KG = Pm
Advantages:
Shorter key lengths
11. Describe the mathematical foundations of RSA algorithm. Perform encryption and
decryption for the following: p = 17, q= 7, e = 5, n = 119, message = “6” Use extended
Euclid’s algorithm to find the private key.
Mathematical foundation:
The functionality of the RSA algorithm is based on aspects of number theory
involving prime numbers and modulus operations.
Euler’s Totient or simply the totient is a term that denotes all the integers smaller
than n that have no common factors with n. Another way of stating this is how
many numbers smaller than n are co-prime with n. The symbol for the totient of a
number is Φ(n).
For example, if n = 8 then you are asking how many numbers smaller than 8 have
no common factors with 8. The answer would be 3, 5, and 7. 1 is also included as a
special case, thus the totient of 8 would be 4. Another term for Euler’s totient is the
Euler phi function.
In modular arithmetic, the equal symbol is not used. Rather the congruence symbol
is. So, the mathematically correct way to write this is:
14 mod 12 ≡ 2
26 mod 12 ≡ 2
38 mod 12 ≡ 2
MAC = C(K, M)
One of the simplest hash functions is the bit-by-bit exclusive-OR (XOR) of every block.
This can be expressed as follows:
Where
The VeriSign Secured Seal is purchased by a website to assure visitors that their
information will remain private. In order to qualify, a company must purchase a
128-bit SSL certificate from VeriSign. The seal can then be purchased from
VeriSign and placed on the site.
28. What are the schemes of MAC where authentication is tied to plain text and
authentication is tied to cipher text ?
MAC-then-Encrypt: Compute the MAC on the clear text, append it to the data, and
then encrypt the whole. This scheme is followed in TLS (Transport layer security).
Encrypt-and-MAC: Compute the MAC on the clear text, encrypt the clear text, and
then append the MAC at the end of the cipher text?
Encrypt-then-MAC: Encrypt the clear text, then compute the MAC on the cipher text,
and append it to the cipher text.
UNIT-III / PART-B
1. Explain MD5 Algorithm and compare its performance with SHA- I.(Nov/Dec’16)
2. Explain digital Signature standard with necessary diagrams in detail.(Nov/Dec’16)
SECURITY
UNIT-IV / PART-A
1. List the three classes of intruders.(Nov/Dec’16)
Masquerader: An individual who is not authorized to use the computer and who
penetrates a system's access controls to exploit a legitimate user's account.
Misfeasor: A legitimate user who accesses data, programs, or resources for which
such access is not authorized, or who is authorized for such access but misuses his
or her privileges.
Clandestine user: An individual who seizes supervisory control of the system and
uses this control to evade auditing and access controls or to suppress audit
collection.
2. Define Zombie.(Nov/Dec’16)
A zombie is a program that secretly takes over another Internet-attached computer
and then uses that computer to launch attacks that are difficult to trace to the zombie's
creator. Zombies are used in denial of-service attacks, typically against targeted Web
sites.
3. Define the roles of firewalls.(Apr/May’17)
A firewall defines a single choke point that keeps unauthorized users out of the
protected network.
A firewall provides a location for monitoring security-related events. Audits and
alarms can be implemented on the firewall system.
A firewall is a convenient platform for several Internet functions that are not
security related.
A firewall can serve as the platform for IPSec.
4. State the difference threats and attacks.(Apr/May’17)
In the field of information security, a threat is the presence of a constant danger to the
integrity of information. This could be in the form of a person or a computer virus or
malware etc. Where as an attack is the actual act to exploit the vulnerabilities of the
information security system.
5. Define Kerberos
Kerberos is an authentication service developed as part of project Athena at MIT. It
was designed to allow the workstations to allow network resources in a secure
manner.
6. Why Kerberos is needed?
In an open distributed environment, users at work stations wish to access services on
servers distributed throughout the network. So, servers must be able to restrict access
to authorized users and must be able to authenticate requests for service. In this
environment, a workstation cannot be trusted to identify its users correctly to network
services.
7. Give requirements of Kerberos
Secure: Should be strong enough that a potential opponent does not find it to be
the weak link.
Reliable: Should be highly reliable and should employ a distributed server
architecture, with one system able to back up another.
25. List four techniques used by firewalls to control access and enforce a security
policy.
Service control: Determines the types of Internet services that can be accessed,
inbound or outbound. The firewall may filter traffic on the basis of IP address,
protocol, or port number.
Direction control: Determines the direction in which particular service requests are
allowed to flow.
User control: Controls access to a service according to which user is attempting to
access it.
Behavior control: Controls how particular services are used. Eg, may filter e-mail to
eliminate spam.
26. In the context of access control, what is the difference between a subject and an
object?
A subject is an entity capable of accessing objects (eg. user, application, process).
An object is resource to which access is controlled. An object is an entity used to
contain information (eg. records, files, directories, processors, communication ports)
27. What are three common types of firewalls?
Electronic mail systems only permit the use of blocks consisting of ASCII text.To
accommodate this restriction PGP provides the service converting the row 8-bit binary
stream to a stream of printable ASCII characters. The scheme used forthis purpose is
Radix-64 conversion.
4.
Discuss about authentication header and ESP with their packet format.
(Apr/May’17)
5.
List out the security services for electronic mail? Explain in detail about privacy in
electronic mail?
6. Discuss about S/MIME in detail.
7. Describe all 8 phase 1 IKE protocols with neat diagram.
8. Explain in detail about ISAKMP/IKE encoding?
9. Describe the SSL and TLS Architecture in detail.