network security CCS354
network security CCS354
NETWORK SECURITY
UNIT-II
Q.1 Name the four requirements defined by Kerberos.
Ans. Kerberos requirements are secure, reliable, transparents and scalable.
Q.2 What types of attacks are addressed by message authentication 7
Ans.: Content modification: Changes to the contents of the message.
Sequence modification: Any modification to a sequence of messages between parties,
including insertion, deletion, and reordering.
* Timing modification: Delay or replay of messages.
Q.3 What is public-key certificate ?
Ans. The public key authority could be a bottleneck in the system, for a User must appeal to
the authority for a public key for every other user that it wishes to contact, As before the
directory of names and public keys maintained by the authority is vulnerable to tempering.
Q.4 What are the requirements for the use of a public-key certificate scheme 7
Any participant can read a certificate to determine the name and public key of the
certificate's owner.
Any participant can verify that the certificate originated from the certificate authority
and is not counterfeit
Only the certificate authority can create and update certificates
Any participant can verify the currency of the certificate
Q.5 What is the life cycle of a key?
Ans: Keys have limited lifetimes for a number of reasons. The most important non protection
against cryptanalysis. Each time the key is used, it generates a number of cipher texts. Ford
describes the life cycle of a kay as follows:
Key generation and possibly registration for a public Key.
key distribution
key activation/deactivation
key replacement or key update
key revocation
Key termination, involving destruction and possibly archival.
Q.6 Define password protection.
Ans: Password protection is the front line protection against intruder to the system. A
password authenticate the ID and provides security to the system.
Q.7 Name the authentication protocols.
Ans: Kerberos is an authentication protocol. It provides a way to authenticate clients
to services to each other through a trusted third party.
Q.8 List four requirements that were defined for kerberos.
Ans: Requirement of Kerberos: Security, Reliability, Transparency and Scalability.
Q.9List any four password selection strategies.
In order to eliminate gaussable passwords four basic techniques are suggested.
1. User education
2. Computer generated password
3. Reactive password checking
4. Proactive password checking
Q.10 Specify the various types of authentication protocol.
Ans: Authentication protocols are Mutual vs one-way authentications, symmetric vs
Public-key approaches, Needham Schroeder protocol.
Q.11 How digital signatures differ from authentication protocols ?
Ans: Digital signatures provide the ability to verify author date and the signature, authenticate
message contents and verified by third parties to resolve disputes. Authentication Protocols
used to convince parties of each others and identity and to establish session keys.
Q.12 What entities constitute a full-service Kerberos environment?
Ans.: A full service environment consists of a Kerberos server, a number of clients
and a number of application servers
Q.13 What are the principle differences between Kerberos version 4 and version $?
Ans:
i) Kerberos VA requires DES and V5 allows many encryption techniques,
ii)VA requires use of IP and V.5 allows other network protocols
iii) Version 5 has a longer ticket lifetime.
iv) Version 5 allows tickets to be renewed.
v) Version 5 can accept any symmetric-key algorithm.
vi) Version 5 uses a different protocol for describing data types,
vii) Version 5 has more overhead than version 4.
Q.14 When are the certificates revoked in X.5097
Ans. The certificate should be revoked before expiry because of following reasons:
1. User's private key is compromised.
2. User is not certified by CA.
3. CA's certificate is compromised.
Q.15 Show how SHA is more secure than MDS?
Ans: SHA is more secure than MDS due to a variety of reasons. First, it produces a larger
digest, 160-bit compared to 128-bit, so a brute force attack would be much more difficult to
carry out. Also, no known collisions have been found for SHA
Q.16 What is realm in Kerberos?
Ans: A Kerberos realm is the domain over which a Kerberos authentication server has the
authority to authenticate a user, host or service. A realm name is often, but not always the
upper case version of the name of the DNS domain over which it presides The Kerberos
server shares a secret key with other Kerberos servers. Therefore. A Kerberos realm is a set
of these managed "nodes" that share the same Kerberos database.
Q.17 What entities constitute a full service in Kerberos environment?
A full-service environment consists of a Kerberos server, a number of clients and a number of
application servers.
Q.18 What is key distribution center ?
Ans: A key distribution center is responsible for distributing keys to pairs such as hosts,
processes, applications. Each user must share a unique key distribution center for purposes of
key distribution.
Q.19 What are the advantages of key distribution 7
It is easy to add and remove entities from the network.
Each entity needs to store only one long-term secret key.
The public file could reside with each entity.
Prevent an active adversary from impersonation.
Q.20 What is key management?
Ans: Key management is the set of techniques and procedures supporting the establishment
and maintenance of keying relationships between authorized parties.
Q.21 What is master key?
Ans: Session keys are transmitted in encrypted form, using a master key that is shared by the
key distribution center and an end system or user.
Q.22 Define session key.
Ans. Communication between end systems is encrypted using a temporary key, often referred
to as a session key.
Q.23 What is PKI?
Ans: A Public-Key Infrastructure (PKI) is defined as the set of hardware, software, people,
policies, and procedures needed to create, manage, store, distribute, and revoke digital
certificates based on asymmetric cryptography.