Questionbank_IS
Questionbank_IS
Confidentiality
Integrity
Availability
Authentication
Non-repudiation
Explanation:
5. Discuss the three core principles of the CIA triad and their importance in
information security.
These principles are essential for securing information systems against threats and
ensuring that data is protected, accurate, and available to those who need it.
6. Explain how security can be applied at the network layer of the OSI model.
Answer: At the network layer (Layer 3) of the OSI model, security can be applied
through:
7. List security services and describe any two with their functions.
Authentication
Encryption
Access Control
Page |3
Integrity Checking
Description of Two:
Answer:
Answer: A symmetric cipher is an encryption algorithm that uses the same key for both
encryption and decryption. This means the same key is used to transform plaintext into
ciphertext and vice versa. Examples include AES (Advanced Encryption Standard) and
DES (Data Encryption Standard).
Answer:
Page |4
Symmetric Cipher: Uses a single key for both encryption and decryption. It
requires that both parties share the same key securely. Examples include AES and
DES.
Asymmetric Cipher: Uses a pair of keys – a public key for encryption and a
private key for decryption. This allows secure communication without sharing a
secret key. Examples include RSA and ECC (Elliptic Curve Cryptography).
Answer: The Caesar cipher is a substitution cipher that shifts each letter in the plaintext
by a fixed number of positions in the alphabet. For example, with a shift of 3, 'A'
becomes 'D', 'B' becomes 'E', and so on. This simple encryption technique replaces each
letter with another that is a set number of places down the alphabet.
12. Provide an example of encoding and decoding a message using the Caesar cipher
with a shift of 3.
Answer:
14. What are the advantages and limitations of monoalphabetic ciphers compared to
other substitution techniques?
Answer:
15. What is a polyalphabetic cipher, and how does it improve upon monoalphabetic
ciphers?
16. What is the Hill cipher, and how does it use linear algebra in encryption?
Answer: The Hill cipher is a polygraphic substitution cipher that uses linear algebra for
encryption. It encrypts blocks of plaintext by representing them as vectors and
multiplying them by a key matrix. The matrix transformation provides the ciphertext, and
the same matrix (or its inverse) is used for decryption.
17. Describe the process of encryption and decryption in the Hill cipher.
Answer:
Encryption: Convert plaintext into a vector, multiply by the key matrix, and
convert the result into ciphertext.
Page |6
Decryption: Compute the inverse of the key matrix, multiply the ciphertext vector
by this inverse matrix, and convert the result back into plaintext.
18. What is the Playfair cipher, and how does it differ from the Caesar cipher?
Answer: The Playfair cipher is a digraph substitution cipher that encrypts pairs of letters
using a 5x5 matrix of letters. Unlike the Caesar cipher, which shifts individual letters, the
Playfair cipher replaces pairs of letters based on their positions in the matrix, providing
more complex encryption.
19. Describe the process of creating the Playfair cipher key table.
Answer:
1. Choose a Keyword: Remove duplicate letters and combine 'I' and 'J' if necessary.
2. Create the 5x5 Matrix: Fill the matrix with the letters of the keyword followed
by the remaining letters of the alphabet.
3. Fill in Missing Letters: After placing the keyword letters, fill in the rest of the
matrix with the unused letters of the alphabet.
20. Explain the rules for encryption and decryption in the Playfair cipher.
Answer:
Encryption:
o For each pair of letters, if they are in the same row, replace them with
letters to their immediate right.
o If they are in the same column, replace them with letters directly below.
o If neither, form a rectangle and replace with letters on the same row but at
the opposite corners.
Decryption: Reverse the encryption rules: letters in the same row are replaced by
those immediately to their left, letters in the same column by those above, and for
other positions, use the opposite corners of the rectangle.
21. Provide an example of encryption and decryption using the Playfair cipher.
Page |7
Answer:
Keyword: "KEYWORD"
Plaintext: "HELLO" (formatted as "HE LL OX")
Encryption:
o Encrypt pairs "HE", "LL", and "OX" using the key matrix.
o Result: "XQ", "XX", "PA"
Decryption:
o Decrypt ciphertext "XQ", "XX", and "PA" using the key matrix.
o Result: "HE", "LL", "OX"
22. What is the Rail Fence cipher, and how does it work?
Answer: The Rail Fence cipher is a transposition cipher where plaintext is written in a
zigzag pattern across multiple "rails" or rows, and then read off row by row. This method
rearranges the letters in a pattern that creates the ciphertext.
23. Explain the process of encoding and decoding a message using the Rail Fence
cipher.
Answer:
Encoding:
1. Write the plaintext in a zigzag pattern across a number of rows.
2. Read the rows sequentially to get the ciphertext.
Decoding:
1. Reconstruct the zigzag pattern using the ciphertext.
2. Read off the plaintext from the pattern.
24. What is the Columnar Transposition cipher, and how does it differ from the Rail
Fence cipher?
Answer: The Columnar Transposition cipher is a transposition cipher where the plaintext
is written into columns based on a keyword. The columns are then rearranged according
Page |8
to the alphabetical order of the keyword letters. Unlike the Rail Fence cipher, which
rearranges characters in a zigzag pattern, the Columnar Transposition cipher rearranges
columns of text.
25. Describe the process of encoding a message using the Columnar Transposition
cipher.
Answer:
1. Prepare the Grid: Write the plaintext into a grid with columns determined by the
length of the keyword.
2. Rearrange Columns: Use the keyword to reorder columns alphabetically.
3. Read Columns: Read off the columns in the new order to create the ciphertext.
Answer:
Key: "KEY"
Plaintext: "MEET ME AFTER THE PARTY"
Encoding:
M E E
T M E
A F T
E R T
H E P
A R T
Y
Page |9
E K Y
E M E
T A F
R E T
E H P
R A T
T Y
Decoding:
o Reconstruct the grid from the ciphertext and rearrange columns according
to the original keyword order to retrieve the plaintext.
Least Significant Bit (LSB) Encoding: Embeds information in the least significant
bits of digital files.
Text Steganography: Conceals information within text by altering characters,
spacing, or formatting.
Audio Steganography: Hides data within audio files by altering sound frequencies
or amplitude.
Answer: The primary goals of steganography are to hide the existence of information
and to ensure that the hidden data remains undetectable by unintended parties, while
allowing the intended recipient to retrieve the hidden message.
Answer: Strengths:
Weaknesses:
Limited Capacity: The amount of data that can be hidden is constrained by the
carrier medium.
Not a Replacement for Encryption: While steganography hides the data, it does
not protect against unauthorized access if the data is discovered. Combining it
with encryption provides better security.
P a g e | 11