NetworkSecurity QA
NetworkSecurity QA
PART - B
Answer ALL the Questions
(5 × 16 = 80)
11. Narrate the framework of OSI security architecture with neat diagram. (CO1)
(or)
12. Elucidate the symmetric cipher model with neat diagram. (CO1)
13. Describe the principle of simplified DES algorithm. State its strength and weakness.
(CO2)
(or)
14. Elucidate the concept of traffic confidentiality. Discuss the techniques of key
distribution and its benefits briefly. (CO2)
15. Explain how efficient RSA operations? Illustrate the generation of RSA key in detail.
(CO3)
(or)
16. Elucidate the working of Diffe-Hellman key exchange with suitable example. (CO3)
17. Discuss about message authentication codes briefly. Illustrate the issues and
challenges in Security of hash functions and MACs briefly. (CO4)
(or)
18. Assume Client C machine wants to communicate with Server S. Explain in detail,
how can it be achieved through Kerberos services? (CO4)
19. Illustrate how privacy, authentication of the source, message integrity and non-
repudiation are achieved in Electronic mail. List the various services of E-mail. (CO5)
(or)
20. State the characteristics and types of intruders. Describe the framework to prevent and
protect the network from the intruders in detail. (CO5)
SCSA1602: Network Security
Weak keys produce repeated encryption cycles (e.g., DES with identical
subkeys).
Semi-weak keys exist in pairs and can encrypt/decrypt each other’s
ciphertext.
7. Mention the difference between Digital signature and Digital Certificates. (CO4)
PART - B
Answer ALL the Questions (5 × 16 = 80)
11. Narrate the framework of OSI security architecture with neat diagram. (CO1)
Answer:
The OSI Security Architecture provides a structured approach to securing data across
different network layers. It defines:
Each layer in OSI can implement specific security mechanisms to support security services.
12. Elucidate the symmetric cipher model with neat diagram. (CO1)
Answer:
The symmetric cipher model involves a single key used for both encryption and decryption.
Main components:
13. Describe the principle of simplified DES algorithm. State its strength and weakness.
(CO2)
Answer:
Simplified DES (S-DES) is a reduced version of DES used for teaching cryptography:
Strengths:
14. Elucidate the concept of traffic confidentiality. Discuss the techniques of key
distribution and its benefits briefly. (CO2)
Answer:
Traffic Confidentiality refers to protecting information about message flow (e.g., sender,
receiver, volume) from being disclosed.
Techniques:
Benefits:
15. Explain how efficient RSA operations? Illustrate the generation of RSA key in
detail. (CO3)
Answer:
RSA Efficiency:
While secure, RSA is slower compared to symmetric encryption due to large integer
computations. Its efficiency can be improved with optimizations like the Chinese Remainder
Theorem.
Used for:
Encryption
Digital signatures
16. Elucidate the working of Diffie-Hellman key exchange with suitable example. (CO3)
Answer:
Diffie-Hellman is a key exchange algorithm used to establish a shared secret between two
parties over an insecure channel.
Steps:
Example:
p = 23, g = 5
Alice picks a = 6 → A = 5^6 mod 23 = 8
Bob picks b = 15 → B = 5^15 mod 23 = 2
Shared secret = 2^6 mod 23 = 64 mod 23 = 18
17. Discuss about message authentication codes briefly. Illustrate the issues and
challenges in Security of hash functions and MACs. (CO4)
Answer:
Message integrity
Authenticity
Types:
Challenges:
Weakness in hash functions (e.g., MD5, SHA-1)
Key management
Replay attacks
Tag forgery
Security depends on both the underlying hash function and the secrecy of the key.
18. Assume Client C wants to communicate with Server S. Explain in detail how it can
be achieved through Kerberos services. (CO4)
Answer:
Kerberos is a secure authentication protocol using a trusted third party (Key Distribution
Center - KDC).
Steps:
Benefits:
19. Illustrate how privacy, authentication of the source, message integrity and non-
repudiation are achieved in Electronic mail. List the various services of E-mail. (CO5)
Answer:
Message confidentiality
Message integrity
Message authentication
Non-repudiation
Proof of delivery and submission
Technologies used include SSL/TLS, PGP, S/MIME, SPF, DKIM, and DMARC.
20. State the characteristics and types of intruders. Describe the framework to prevent
and protect the network from the intruders in detail. (CO5)
Answer:
Characteristics of Intruders:
Unauthorized access
Data theft or modification
Disruption of services
Evade detection
Types of Intruders: