Crypto Pyq$$1234
Crypto Pyq$$1234
Access Control:
Access control is a security mechanism that determines who or what is permitted to access specific
resources in a computing environment. It ensures that only authorized users or devices can interact
with a system, preventing unauthorized access and potential security breaches.
Types of Access Control:
1. Discretionary Access Control (DAC):
o The owner of the resource decides who can access it.
o Example: A file owner sets permissions for other users.
2. Mandatory Access Control (MAC):
o Access is controlled by a central authority based on predefined policies.
o Example: Military security classifications (Top Secret, Confidential, etc.).
3. Role-Based Access Control (RBAC):
o Access is assigned based on roles within an organization.
o Example: An HR employee can access employee records, but an IT admin cannot.
4. Attribute-Based Access Control (ABAC):
o Access is granted based on attributes like user identity, location, or time.
o Example: A bank system allows transactions only during business hours.
Availability:
Availability ensures that systems, networks, and data are accessible to authorized users whenever
needed. It protects against disruptions caused by hardware failures, cyberattacks, or natural disasters.
Difference Between Access Control and Availability:
Feature Access Control Availability
Purpose Restricts unauthorized access Ensures system resources are available
Focus Authentication & authorization Reliability & uptime
Threats Unauthorized users, privilege escalation DoS attacks, hardware failures
Example A password-protected document A website staying online despite high traffic
5.b) Transform "UNIVERSITY" into Cipher Text using Modified Caesar Cipher Technique A
Modified Caesar Cipher often involves multiple shifts or variations, such as shifting different letters
by different values.
For example, let's assume we use a shift pattern of +3, +1, +4, +2, +3, +1, +4, +2, +3 for each
letter.
Plaintext: U N I V E R S I T Y
Shifts: +3 +1 +4 +2 +3 +1 +4 +2 +3 Applying shifts:
• U → X (shift +3)
• N → O (shift +1)
• I → M (shift +4)
• V → X (shift +2)
• E → H (shift +3)
• R → S (shift +1)
• S → W (shift +4) • I → K (shift +2)
• T → W (shift +3)
Ciphertext: XOMXHSWKW
6. Differentiate Between the Following Terms (Answer Any Two)
a) Symmetric-key vs. Asymmetric-key Cryptography
Feature Symmetric-key Cryptography Asymmetric-key Cryptography
Same key for encryption & Different keys: Public key (encrypts) & Private
Keys Used decryption key (decrypts)
Security Less secure if key is exposed More secure due to key separation
Security More secure, but still vulnerable Less secure, prone to hash collisions
Use Cases Digital signatures, SSL certificates Checksums, file integrity verification
•
4.b) Different Kinds of Attacks on Digital Signatures
Key Theft Attack:
a If an attacker gains access to a user’s private key, they can forge valid signatures.
b Solution: Use strong key protection mechanisms (e.g., Hardware Security Modules).
4. Replay Attack:
• The attacker intercepts and reuses a valid signature for fraudulent transactions.
• Solution: Implement timestamps and unique session IDs in digital signatures.
3. Man-in-the-Middle (MitM) Attack:
• The attacker intercepts and alters the signed message before forwarding it.
• Solution: Use strong encryption and authentication mechanisms.
4. Hash Collision Attack:
• If two different messages produce the same hash value, an attacker can replace a legitimate
message with a fraudulent one.
• Solution: Use strong hash functions like SHA-256 instead of weak ones like MD5.
5.a) Limitations of the Caesar Cipher Technique & How to Overcome Them Limitations
of Caesar Cipher:
5. Easy to break using brute force: Since there are only 25 possible shifts, an attacker can try all
of them quickly.
6. No security against frequency analysis: Certain letters (like ‘E’ and ‘T’ in English) appear more
often, making decryption easy.
7. No key variation: Uses a single fixed key (shift value), making it predictable.
How to Overcome These Limitations?
4. Use a more complex cipher, such as Vigenère Cipher, which uses a keyword instead of a single
shift value.
5. Use modern encryption algorithms, like AES, which use multiple rounds of encryption.
6. Increase key length and randomness to make cryptanalysis harder.
5.b) Transform "UNIVERSITY" into Cipher Text using Modified Caesar Cipher Technique A
Modified Caesar Cipher often involves multiple shifts or variations, such as shifting different letters
by different values.
For example, let's assume we use a shift pattern of +3, +1, +4, +2, +3, +1, +4, +2, +3 for each
letter.
Plaintext: U N I V E R S I T Y
Shifts: +3 +1 +4 +2 +3 +1 +4 +2 +3 Applying shifts:
• U → X (shift +3)
• N → O (shift +1)
• I → M (shift +4)
• V → X (shift +2)
• E → H (shift +3)
• R → S (shift +1)
• S → W (shift +4) • I → K (shift +2)
• T → W (shift +3)
Ciphertext: XOMXHSWKW
6. Differentiate Between the Following Terms (Answer Any Two)
a) Symmetric-key vs. Asymmetric-key Cryptography
Feature Symmetric-key Cryptography Asymmetric-key Cryptography
Same key for encryption & Different keys: Public key (encrypts) & Private
Keys Used decryption key (decrypts)
Security Less secure if key is exposed More secure due to key separation
Security More secure, but still vulnerable Less secure, prone to hash collisions
Use Cases Digital signatures, SSL certificates Checksums, file integrity verification
5.b) Transform "UNIVERSITY" into Cipher Text using Modified Caesar Cipher Technique A
Modified Caesar Cipher often involves multiple shifts or variations, such as shifting different letters
by different values.
For example, let's assume we use a shift pattern of +3, +1, +4, +2, +3, +1, +4, +2, +3 for each
letter.
Plaintext: U N I V E R S I T Y
Shifts: +3 +1 +4 +2 +3 +1 +4 +2 +3 Applying shifts:
• U → X (shift +3)
• N → O (shift +1)
• I → M (shift +4)
• V → X (shift +2)
• E → H (shift +3)
• R → S (shift +1)
• S → W (shift +4) • I → K (shift +2)
• T → W (shift +3)
Ciphertext: XOMXHSWKW
6. Differentiate Between the Following Terms (Answer Any Two)
a) Symmetric-key vs. Asymmetric-key Cryptography
Feature Symmetric-key Cryptography Asymmetric-key Cryptography
Same key for encryption & Different keys: Public key (encrypts) & Private
Keys Used decryption key (decrypts)
Security Less secure if key is exposed More secure due to key separation
Security More secure, but still vulnerable Less secure, prone to hash collisions
Use Cases Digital signatures, SSL certificates Checksums, file integrity verification