0% found this document useful (0 votes)
21 views

CNS QUESTION 2024

Uploaded by

shradha kakade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

CNS QUESTION 2024

Uploaded by

shradha kakade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CNS QUESTION 2024

What do you mean by S/MIME? (APR 2012)


S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public keyencryption and signing
of MIME data. S/MIME is on an IETFstandards track and defined in a number of documents, most
importantly RFCs (3369,3370,3850,3851). S/MIME was originally developed by RSA Data Security
Inc.S/MIME provides the following cryptographic security services for electronic messaging applications:
authentication, message integrity, non-repudiation of origin (using digital signatures), privacy and data
security (using encryption)

What are the services provided by PGP ? ( APRIL /MAY 2018)


 Digital signature
 Message encryption
 Compression
 E-mail compatibility
 Segmentation

What is the difference C401.5 BTL 1


between TLS and SSL security?
( APRIL /MAY 2018)
Secure Sockets Layer (SSL) is a
cryptographic protocol that
enables secure
communications over the
Internet. SSL works mainly
through using public/private
key encryption on data. It is
commonly used on web
browsers, but SSL can also be
used with email servers or any
kind of client-server
transaction.
Transport Layer Security (TLS)
is the successor to SSL. TLS
uses stronger encryption
algorithms and has the ability
to work on different ports.
PART

What are the function areas of IP


security?
 Authentication
 Confidentiality
 Key management
Define Security service.

List the design goals of


firewalls?

List any two applications of X.509 Certificate? ( NOV/DEC


2017) Various code-signing schemes, such as signed Java
ARchives, and Microsoft Authenticode. Various secure E-Mail
standards, such as PEM and S/MIME. E-Commerce protocols,
such as SET.

State the difference between threats and attack? (APR 2017)


Threat: object, person, or other entity representing a constant
danger to an asset. This can take any form and can be
malevolent, accidental, or simply an act of nature. Attack: a
deliberate act that exploits vulnerability. It can be either active
or passive attack.

What are the different modes of operation in DES?

What are the types of


firewalls? The three types of
firewalls are
 Packet Filtering Router
 Application Level gateway
 Circuit level gateway

List out the Requirements of Kerberos. (APR2011)


 Secure
 Reliable
 Transparent
 Scalable

Define Intrusion. (APR2012,NOV2012) The process of


accessing a network or system without proper permission
or rights

Define Hash function (APRIL/ MAY 2018) A function that maps a message of
any length into a fixed length hash value, which serves as the authenticator
What is meant by Message Authentication? Message Authentication is a
mechanism or service used to verify the integrity of a message. Message
authentication assures that data received are exactly as sent by (i.e., contain no
modification, insertion, deletion, or replay) and that the purported identity of
the sender is valid.

What is the difference between public key and private key cryptosystem?(APR2012, NOV2011)
Conventional(privatekey) Encryption Public key Encryption

1. Same algorithm with same key used 1. Same algorithm is used used for
for encryption and decryption. encryption & decryption with a pair of
keys.
2. Sender & receiver must share the 2. Sender & re ceiver have one of. the
algorithm and key matched pair keys
3. Key must be kept secret. 3. Any one of the key must bekept
secret.

Write down the purpose of S-Boxes in DES?

Define Cipher Block Chaining (CBC) mode. In


Cipher Block Chaining (CBC) mode the input to the
encryption algorithm is the XOR of the next 64 bits
of plaintext and the preceding 64 bits of cipher
text

Define Counter (CTR). In Counter (CTR) mode each block of plaintext is XOR ed with an encrypted counter. The
counter is incremented for each subsequent block

What primitive operations are used in


RC5
 Key expansion
 Encryption
 Decryption

What is an elliptic curve? (DEC 2016) It is a plane algebraic curve defined by an equation of the form y2 = x3 +ax +b
that is non-singular also graph has no cusps or self intersections.

Define Digital signature. A digital signature is an authentication mechanism that enables the creator of a message to
attach a code that acts as a signature. Typically the signature is formed by taking the hash of the message and
encrypting the message with the creator’s private key. The signature guarantees the source and integrity of the
message

5M
Explain about MD5 in detail.

Difference between private key and public key


algorithm (APR 2017) Public key encryption encrypts
data using the recipient’s public key and it cannot be
decrypted without using a matching private key. i.e.,
you need one key to lock (encrypt the piantext) and
another key to unlock (decrypt the cypertext). Private
key cannot be used in the place of the public key. If the
locking key is made private, this system makes it
possible to verify that the documents were locked by
the owner. The reason is that a message encrypted by
the sender can only be opened by a person with the
matching public key, thus verifying that the sender did
actually hold the private key (meaning that the original
and non-tampered message has been received).
Therefore, this is used for digital signatures.

10 m
Explain in detail about DES and Triple DES.

Explain kerberos authentication mechanism with


suitable diagram?

Explain in detail about firewalls.

Explain the types of Intrusion Detection Systems.

Write a detailed note on Digital signatures.

Illustrate about the SHA algorithm and explain.

Explain about AES in


detail.

Explain in detail about elliptic curve


cryptography

Explain in detail about the security services (PGP, S/MIME) for E-


mail.

Describe the SSL Architecture in detail.

You might also like