0% found this document useful (0 votes)
14 views2 pages

Cns 2marks

Cryptography and network security

Uploaded by

Ramya V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

Cns 2marks

Cryptography and network security

Uploaded by

Ramya V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CNS 2MARKS

1.Write the difference between public key and private key crypto systems?

To conclude, private keys can be used for both encryption and decryption, while Public keys are used
only for the purpose of encrypting the sensitive data. Private keys are shared between the sender
and the receiver, whereas public keys can be freely circulated among multiple users.

2. List the Authentication requirements?

• Password Requirements.

• General Authenticator Requirements.

• Authenticator Lifecycle Requirements.

• Credential Storage Requirements.

• Credential Recovery Requirements.

• Look-up Secret Verifiers.

• Out-of-Band Verifiers.

• Single or Multifactor One-Time Verifiers.

3.What are birthday attacks?

A birthday attack is a cryptographic attack that uses probability theory to find hash collisions. It's a
type of brute-force attack that exploits the birthday paradox.

4. What do you mean by MAC?

A MAC address (short for medium access control address) is a unique identifier assigned to a
network interface controller (NIC) for use as a network address in communications within a network
segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi,
and Bluetooth.

5. What is meant by Hash function?

A hash function is a mathematical function or algorithm that simply takes a variable number of
characters (called a ”message”) and converts it into a string with a fixed number of characters.

6. What is weak collision Resistance?

Weak collision resistance is a property of a hash function that makes it difficult to find another input
that produces the same hash as a given input. It's also known as second preimage resistance.

7. What are the functions used to produce an authenticator?

To produce an authenticator, the primary function used is a Message Authentication Code (MAC).

• Mac function
• Cryptography hash func
• Secret key

8. Define S/MIME?

Secure/Multipurpose Internet Mail Extensions (S/MIME) is an email encryption and signing protocol
that protects the content and integrity of messages.
CNS 2MARKS
9.What are zombies?

Zombies are mythological creatures that are usually depicted as reanimated corpses of humans:

• Appearance
• Origin
• Purpose

10. What is an intruder?

someone who enters a place without permission in order to commit a crime: Intruders had entered
the house through a back window.

11.Give the benefits of IP security?

• Encryption
• Ip address management
• Replay protection
• Safeguarding ip address
• Centralized management
• Data origin authentication

12. Differentiate Transport and Tunnel mode in IPsec?

Tunnel Mode provides end-to-end security by encrypting the entire IP packet, while Transport Mode
only encrypts the payload of the packet.

You might also like