MCQS - Cs 707 Paper-Solved
MCQS - Cs 707 Paper-Solved
MCQS - Cs 707 Paper-Solved
Q1 _______________ is a symmetric block cipher, uses a 64 bit key, puts the data through 16 rounds of transposition and
substitution, and has 5 different modes of operation.
AES
DES
Blowfish
None of above
Q2 Examples of asymmetric key algorithms are:
Diffie Hellman, RSA and El-Gamal
RC4, RC5, and RC6
DES, 3DES, and AES
MD4, MD5, and MD6
Q3 The standard used in digital certificates that defines its structure, fields, and values is
Kerberos
End-to-end encryption
X.509
The standard used in IPSEC VPNs
Q4 A cryptosystem consists of:
Software, algorithms, protocols, and keys
PGP
An algorithm used for encryption and decryption
Is software used for testing security of applications
Q5 Cryptanalysis is:
The practice of analyzing secret codes but not breaking them
The technique used by forensic investigators to trace the source of malware infection
The science related to research and development of cryptography
The practice of breaking cryptic systems
Q6 An electro-mechanical cipher machine used by the Germans in World War II is _________________
MAC
Enigma
Skytale
All above
Q7 A digital signature is best described as:
An electronic verification system used for transactional integrity in banking
A hash value encrypted by the senders private key
An electronic verification system used for encryption and hashing
A hash value encrypted with the DES, 3DES, or AES algorithms
Q8 A practice of Choosing a key that is extremely random and the algorithm should use the full range of the key-space is
called ______________________.
Cipher management
Key combination
Key management
None of above
Q9 _____________________ uses two instances of the same key while encrypting and decrypting messages.
Skytale
Symmetric Cryptography
Asymmetric Cryptography
SSL
Q10 _______________ is a program and protocol used to log in securely to another device or system on a network.
Secure Shell (SSH)
SSL
HTTP
PGP
AES
Digital signature
DES
3DES algorithms
The technique used by forensic investigators to trace the source of malware infection
The science related to research and development of cryptography
The practice of breaking cryptic systems
Choosing a key that is extremely random and the algorithm should use the full range of the key-space
Labeling keys so that they are not lost or stolen
Returning the key to the CA after it has completed its lifetime
At least two senior officers of the company to issue and maintain a record of the keys
Q:17 In end-to-end encryption:
Symmetric
Asymmetric
Skytale
Enigma
Q:20 The standard used in digital certificates that defines its structure, fields, and values is ____________________.
X.509
Kerberose
Cryptography
PKI
Part-I Short Questions (5 marks each)
Compression must occur before encryption, because compression is inefficient on encrypted data: compression
algorithms work on detecting redundancies and structure in the data, and encryption is designed to hide
redundancies and structure. Basically, compression does not work at all on properly encrypted data. Conversely,
if compression works on encrypted data, then the encryption layer should be viewed with deep suspicion...
When hashing occurs in PGP, it is as part of a signature algorithm, or as an integrity check which is generally
known as a MAC. There are several ways to do a MAC; the theoretical "good" way is to apply the MAC on the
encrypted data. However, PGP dates from an older time where theory was not yet fully worked out, and uses a
hash value (i.e. a function which as no key) and then includes the hash in the encrypted data (see section 5.13);
the hash value is turned into a MAC by virtue of reusing the encryption key. In the case of such a MAC, the
MAC (i.e. the underlying hash) occurs on whatever is encrypted, so that's the compressed data (if compression
was used at all). Since you talk about compression "between" the hash and the encryption, then I suppose that
you are not talking about that hash at all.
Compressing a sequence of characters drawn from an alphabet uses string substitution with no a priori
information. An input data block is processed into an output data block comprised of variable length
incompressible data sections and variable length compressed token sections. Multiple hash tables are used based
on different subblock sizes for string matching, and this improves the compression ratio and rate of
compression. The plurality of uses of the multiple hash tables allows for selection of an appropriate
compression data rate and/or compression factor in relation to the input data. Using multiple hashing tables with
a recoverable hashing method further improves compression ratio and compression rate. Each incompressible
data section contains means to distinguish it from compressed token sections.
PKI is an ISO authentication framework that uses public key cryptography and the X.509 standard.
In cryptography, X.509 is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management
Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key
certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm.
The standard for how the CA creates the certificate is X.509, which dictates the different fields used in the
certificate and the valid values that can populate those fields
We are currently at version 4 of this standard, which is often denoted as X.509v4. Many cryptographic protocols
use this type of certificate, including SSL.
The certificate includes the serial number, version number, identity information, algorithm information, lifetime
dates, and the signature of the issuing authority.
.4. What are one way functions? How they are implemented in cryptography?
A one-way function is a mathematical function that is easier to compute in one direction than in the opposite
direction.
An analogy of this is when you drop a glass on the floor. Although dropping a glass on the floor is easy, putting
all the pieces back together again to reconstruct the original glass is next to impossible.
This concept is similar to how a one-way function is used in cryptography, which is what the RSA
algorithm, and all other asymmetric algorithms, is based upon.
The easy direction of computation in the one-way function that is used in the RSA algorithm is the process of
multiplying two large prime numbers.
Multiplying the two numbers to get the resulting product is much easier than factoring the product and
recovering the two initial large prime numbers used to calculate the obtained product, which is the difficult
direction.
RSA is based on the difficulty of factoring large numbers that are the product of two large prime numbers.
Attacks on these types of cryptosystems do not necessarily try every possible key value, but rather try to factor
the large number, which will give the attacker the private key.
When a user encrypts a message with a public key, this message is encoded with a one-way function (breaking a
glass). This function supplies a trapdoor (knowledge of how to put the glass back together), but the only way
the trapdoor can be taken advantage of is; if it is known about and the correct code is applied. The private key
provides this service.
The private key knows about the trapdoor, knows how to derive the original prime numbers, and has the
necessary programming code to take advantage of this secret trapdoor to unlock the encoded message
(reassembling the broken glass). Knowing about the trapdoor and having the correct functionality to take
advantage of it are what make the private key private.
When a one-way function is carried out in the easy direction, encryption and digital signature verification
functionality are available. When the one-way function is carried out in the hard direction, decryption and
signature generation functionality are available.
This means only the public key can carry out encryption and signature verification and only the private key can
carry out decryption and signature generation.
Part-II Long Questions (10 marks each)
In the OSI model approach, security is addressed at each layer of the OSI model, shown below. By comparing
in depth the OSI model with the concept of Application Security by Defense, IT managers better understand that
securing enterprise application is more than authentication, encryption, OS hardening, etc. At each level of the
OSI model there are
Security vulnerabilities and, therefore, security prevention measures that can be taken to ensure that enterprise
applications are protected. Importantly, the capability IT managers have to mitigate risks decreases at the higher
OSI model layers.
One reason IT managers have less power to protect applications at the higher OSI layers is that at these higher layers,
developers have much more influence over security measures.
However, security measures are possible at every OSI layer. Addressing security threats at every layer reduces the risk of
enterprise application compromise or Denial of Service.
Examples of vulnerabilities and solutions at each layer provide a better understanding of the topics presented.
The OSI Physical layer represents physical application security, which includes access control, power, fire, water, and
backups. Many of the threats to security at the Physical layer cause a Denial of Service (DoS) of the enterprise
application, making the application unavailable to enterprise users.
Physical locks, both on equipment and facilities housing the equipment, are imperative to keep intruders out. In order to
use information one must have access to it. Security cables on laptops and system cases with power button locks are
examples of procuring equipment with physical security capabilities.
The Data, or Data Link, layer of the OSI model encompasses switch security topics such as ARP spoofing, MAC
flooding and spanning tree attacks.
Simple configuration changes to the network switch can help protect enterprise applications from Data layer attacks.
The Network and Transport layersof the OSI model are where the most common security
precautions take place this layer is where routers and firewalls are implemented. Threats that occur at this level are
unauthorized retrieval of endpoint identity, unauthorized access to internal systems, SYN flood attacks and ping of
death.
Implementing Network Address Translation, Access Control Lists, and firewall technologies mitigates these
risks.
The Session and Presentation layers are the lower layers of the Application Set of the OSI model. At these
layers the IT managers ability to mitigate application security risk begins to diminish as developers take a
bigger role in protecting applications.
IT managers can prevent unauthorized login/password accesses and unauthorized data accesses, which are
common attacks at these layers, by using encryption and authentication methods.
The Application layer is the final layer of the Application Set and the OSI model. Many security protection
methods are the responsibility of the programmer at this layer. Backdoor attacks occur at this level and it is the
programmers responsibility to close those doors.
IT managers can use access control methods described to assist in preventing backdoor attacks; also, IT
managers can set up tools such as virus scanners, WebInspect, and intrusion detection devices to help prevent
compromise of enterprise applications.
The comprehensive system required to provide public-key encryption and digital signature services is known as
a public-key infrastructure. The purpose of a public-key infrastructure is to manage keys and certificates. By
managing keys and certificates through a PKI, an organization establishes and maintains a trustworthy
networking environment. A PKI enables the use of encryption and digital signature services across a wide
variety of applications.
1. CA (Certificate Authority )
A CA is a trusted organization (or server) that maintains and issues digital certificates. When a person requests a
certificate, the registration authority (RA) verifies that individuals identity and passes the certificate request off
to the CA.
The CA constructs the certificate, signs it, sends it to the requester, and maintains the certificate over its
lifetime.
When another person wants to communicate with this person, the CA will basically vouch for that persons
identity
2. RA (Registration authority)
The registration authority (RA) performs the certification registration duties. The RA establishes and confirms
the identity of an individual, initiates the certification process with a CA on behalf of an end user, and performs
certificate life-cycle management functions.
The RA cannot issue certificates, but can act as a broker between the user and the CA. When users need new
certificates, they make requests to the RA, and the RA verifies all necessary identification information before
allowing a request to go to the CA.
3. Certificate repository
Certificate repositories store certificates so that applications can retrieve them on behalf of users. The term
repository refers to a network service that allows for distribution of certificates.Over the past few years, the
consensus in the information technology industry is that the best technology for certificate repositories is
provided by directory systems that are LDAP (Lightweight Directory Access Protocol)-compliant.
CRL: The most popular means for distributing certificate revocation information is for the CA to create secure
certificate revocation lists (CRLs) and publish these CRLs to a directory system. CRLs specify the unique serial
numbers of all revoked certificates. Prior to using a certificate, the client-side application must check the
appropriate CRL to determine if the certificate is still trustworthy. Client-side applications must check for
revoked certificates consistently and transparently on behalf of users.
Updating users key pairs: The process of updating keys pairs should be transparent to users. This
transparency means users do not have to understand that key update needs to take place and they will never
experience a denial of service because their keys are no longer valid. To ensure transparency and prevent
denial of service, users? key pairs must be automatically updated before they expire.
Maintaining histories of key pairs: When encryption key pairs are updated, the history of previous decryption
keys must be maintained. This key history allows users to access any of their prior decryption keys to decrypt
data. (When data is encrypted with a users encryption key, only the corresponding decryption keythe paired
keycan be used for decrypting). To ensure transparency, the client-side software must automatically manage
users? histories of decryption keys.
7. Timestamping
Trusted Timestamping is the process of securely keeping track of the creation and modification time of a
document. Security here means that no one not even the owner of the document should be able to change
it once it has been recorded provided that the timestamper's integrity is never compromised.
The administrative aspect involves setting up a publicly available, trusted timestamp management infrastructure
to collect, process and renew timestamps
8. Client-side software
A consistent, easy-to-use PKI implementation within client-side software lowers PKI operating costs. In
addition, client-side software must be technologically enabled to support all of the elements of a PKI discussed
earlier in this paper. The following list summarizes the requirements client-side software must meet to ensure
that users in a business receive a usable, transparent (and thus, acceptable) PKI.
Non-repudiation means that an individual cannot successfully deny involvement in a transaction. In the paper-
world, individuals signatures legally bind them to their transactions (for example, credit card charges, business
contracts ). The signature prevents repudiation of those transactions. In the electronic world, the replacement
for the pen-based signature is a digital signature. All types of electronic commerce require digital signatures
because electronic commerce makes traditional pen-based signatures obsolete.
Because for a secure network, its transferred data must read, changed or destroyed and it must be available to
the authorized users at any cost. So All these three goals are so important.
2. Why Symmetric Key encryption Algorithm is used in an organization. Give its advantages and draw
backs.
Strengths (Advantages)
Much faster (less computationally intensive) than asymmetric systems
Hard to break if using a large key size
Weaknesses (Drawbacks)
Requires a secure mechanism to deliver keys properly
Each pair of users needs a unique key, so as the number of individuals increases, so does the number of
keys, possibly making key management overwhelming
Provides confidentiality but not authenticity or nonrepudiation
Plaintext
Encryption algorithm
Secret key
Cipher text
Long Questions (10 marks each)
1. Discuss the strength of Cryptosystem on basis of different parameters 10
The strength of an encryption method comes from the algorithm, the secrecy of the key, the length of the
key, the initialization vectors, and how they all work together within the cryptosystem.
When strength is discussed in encryption, it refers to how hard it is to figure out the algorithm or key,
whichever is not made public.
The strength of an encryption method correlates to the amount of necessary processing power, resources,
and time required to break the cryptosystem or to figure out the value of the key.
Breaking a cryptosystem can be accomplished by a brute force attack, which means trying every
possible key value until the resulting plaintext is meaningful
Depending on the algorithm and length of the key, this can be an easy task or one that is close to
impossible
The goal when designing an encryption method is to make compromising it too expensive or too time-
consuming
Another name for cryptography strength is work factor, which is an estimate of the effort and resources
it would take an attacker to penetrate a cryptosystem
Important elements of encryption are to use an algorithm without flaws, use a large key size, use all
possible values within the keyspace, and to protect the actual key.
If one element is weak, it could be the link that dooms the whole process.Even if a user employs an algorithm
that has all the requirements for strong encryption, including a large keyspace and a large and random key
value, if he shares his key with others, the strength of the algorithm becomes almost irrelevant.
2. If you are supposed to implement one-time pad encryption scheme, which requirements do you
think, each pad fulfill so that it is unbreakable?
For a one-time pad encryption scheme to be considered unbreakable, each pad in the scheme must be:
Made up of truly random values
Used only one time
Securely distributed to its destination
Secured at senders and receivers sites
At least as long as the message
A number generator is used to create a stream of random values and must be seeded by an initial value. This
piece of software obtains its seeding value from some component within the computer system (time, CPU
cycles, and so on).
Although a computer system is complex, it is a predictable environment, so if the seeding value is predictable in
any way, the resulting values created are not truly randombut pseudorandom.
A substitution cipher uses a key to dictate how the substitution should be carried out
In the Caesar cipher, each letter is replaced with the letter three places beyond it in the alphabet. The
algorithm is the alphabet, and the key is the instruction shift up three.
Substitution is used in todays symmetric algorithms, but it is extremely complex compared to this
example
Transposition Ciphers
In a transposition cipher, the values are scrambled, or put into a different order
The key determines the positions the values are moved to, as illustrated in the Figure
This is a simplistic example of a transposition cipher and only shows one way of performing
transposition
When implemented with complex mathematical functions, transpositions can become quite sophisticated
and difficult to break
8. What are the attributes that make the symmetric cryptography so powerful? Also give the
limitations while using the symmetric key cryptography. 10
Symmetric Cryptography
In a cryptosystem that uses symmetric cryptography, the sender and receiver use two instances of the
same key for encryption and decryption, as shown in the Figure
So the key has dual functionality, in that it can carry out both encryption and decryption processes
Therefore, implementing symmetric cryptography (particularly with hardware) can be highly effective because
you do not experience any significant time delay as a result of the encryption and decryption. Symmetric
cryptography also provides a degree of authentication because data encrypted with one symmetric key cannot
be decrypted with any other symmetric key. Therefore, as long as the symmetric key is kept secret by the two
parties using it to encrypt communications, each party can be sure that it is communicating with the other as
long as the decrypted messages continue to make sense.
Limitations
Secure key distribution
Scalability
Security services
Symmetric cryptosystems have a problem of key transportation. The secretkey is to be transmitted to the
receiving system before the actual message is tobe transmitted. Every means of electronic
communication is insecure as it isimpossible to guarantee that no one will be able to tap
communicationchannels. So the only secure way of exchanging keys would be exchangingthem
personally.
Each pair of users needs a unique key, so as the number of individuals increases, so does the number of
keys, possibly making key management overwhelming.
Provides confidentiality but not authenticity or nonrepudiation
Cannot provide digital signatures that cannot be repudiated.
Initialize and populate the distribution center key database on the master
Create one or more Tivoli administrators as Kerberos principals
Set up any other computer systems in the realm
Ensure that the Tivoli daemon is configured to use Kerberos authentication
CMAC is a block cipherbased message authentication code algorithm. This means that it can provide the
authentication of the data origin (as in the computer it was sent from) but not the person who sent it.
CMAC Functionality
So here is how CMAC works: the symmetric algorithm (AES or 3DES) creates the symmetric key. This key
is used to create subkeys. The subkeys are used individually to encrypt the individual blocks of a message as
shown in the Figure.
This is the exactly how CBC-MAC works, but with some better magic that works underneath the
hood.
Secret key is used in symmetric cryptography where only one key is needed for encryption and decryption
Private and public key are the two keys that two different entities are using in public key cryptography to
decrypt (using the private) what have been encrypted with the public or reverse.
applications
3. What is an asymmetric key algorithm
Asymmetric algorithms use pairs of keys. One is used for encryption and the other one for decryption. The
decryption key is typically kept secretly, therefore called ``private key'' or ``secret key'', while the encryption
key is spread to all who might want to send encrypted messages, therefore called ``public key''. Everybody
having the public key is able to send encrypted messages to the owner of the secret key. The secret key can't be
reconstructed from the public key. The idea of asymmetric algorithms was first published 1976 by Diffie and
Hellmann.
Long Questions
The algorithm computes discrete logarithms of elliptic curves, which is different from calculating discrete
logarithms in a finite field (which is what Diffie-Hellman and El Gamal use).
Some devices have limited processing capacity, storage, power supply, and bandwidth such as wireless devices
and cellular telephones. With these types of devices, efficiency of resource use is very important.
ECC provides encryption functionality,requiring a smaller percentage of the resources needed by RSA and other
algorithms, so it is used in these types of devices.
In most cases, the longer the key, the more protection that is provided, but ECC can provide the same level of
protection with a key size that is shorter than what RSA requires.
Because longer keys require more resources to perform mathematical tasks, the smaller keys used in ECC
require fewer resources of the device.
Solution:
ACTIVE ATTACK:
From the word active, it is clear that it is nothing but direct attack. In this case the attacked one gets aware of
the attack. Suppose, someone installed a logic bomb to your PC & after clicking on it, your PC starts to be
shutdown.
PASSIVE ATTACK
It is indirect attack. The attacked host is completely unaware about this; hence it is called passive attack. Like
as, the attacker is trying to observe the host.
It is very hard to say which one is more harmful between active and passive attack. Sometimes active attack and
sometimes it may be passive attack also
PKI supports the distribution and identification of public encryption keys, enabling users and computers to both
securely exchange data over networks such as the Internet and verify the identity of the other party.
Components:
This function used for message integrity and the generated hashed number must be the same when the recipient
receives the message and run the same with hash function,
if the resultant hashed number / message digest would be the same, the received message would not be altered.
The standard for how the CA creates the certificate is X.509, which dictates the different fields used in the
certificate and the valid values that can populate those fields. The most commonly used version is 3 of this
standard, which is often denoted as X.509v3. Many cryptographic protocols use this type of certificate,
including SSL.
PKI is an ISO authentication framework that uses public key cryptography and the X.509 standard.
The framework was set up to enable authentication to happen across different networks and the Internet.
Particular protocols and algorithms are not specified, which is why PKI is called a framework and not a specific
technology.
4. What are one way functions? How they are implemented in cryptography?
A one-way function is a mathematical function that is easier to compute in one direction than in the opposite
direction. CA constructs the certificate, signs it,tQ: Characteristics Of Strong Stream Ciphers
Long periods of no repeating patterns within key stream values. Bits generated by the key stream must be
random
Statistically unpredictable key stream The bits generated from the key stream generator cannot be predicted
A key stream not linearly related to the key If someone figures out the key stream values, that does not mean
she now knows the key value
Statistically unbiased key stream (as many 0s as 1s). There should be no dominance in the number of 0s or
1s in the key stream
1- Public-key encryption
2- Digital signatures
3- Secure key exchange:
What Is the Difference Between Public Key Cryptography and Public Key Infrastructure?
Public key cryptography is the use of an asymmetric algorithm. Thus, the terms asymmetric algorithm and
public key cryptography are interchangeable and mean the same thing. Examples of asymmetric algorithms are
RSA, elliptic curve cryptosystem (ECC), Diffie-Hellman, El Gamal, LUC, and Knapsack.
The OSI reference model for networking (ISO 7498-1) is designed around seven layers arranged in a stack. The OSI
security architecture reference model (ISO 7498-2) is also designed around seven layers, reflecting a high level view of
the different requirements within network security.
Layers (ISO 7498-1) ISO 7498-2 Security Model
Application Authentication
Presentation Access Control
Session Non-Repudiation
Transport Data Integrity
Network Confidentiality
Data Link Assurance / Availability
Physical Notarization / Signature
Q: - In context of hashing what is meant by compression.
This function used for message integrity and the generated hashed number must be the same when the recipient
receives the message and run the same with hash function,
if the resultant hashed number / message digest would be the same, the received message would not be altered.
The standard for how the CA creates the certificate is X.509, which dictates the different fields used in the certificate and
the valid values that can populate those fields. The most commonly used version is 3 of this standard, which is often
denoted as X.509v3. Many cryptographic protocols use this type of certificate, including SSL.
PKI is an ISO authentication framework that uses public key cryptography and the X.509 standard.
The framework was set up to enable authentication to happen across different networks and the Internet.
Particular protocols and algorithms are not specified, which is why PKI is called a framework and not a specific
technology.
4. What are one way functions? How they are implemented in cryptography?
A one-way function is a mathematical function that is easier to compute in one direction than in the opposite direction.
An analogy of this is when you drop a glass on the floor. Although dropping a glass on the floor is easy, putting all the
pieces back together again to reconstruct the original glass is next to impossible. This concept is similar to how a one-
way function is used in cryptography, which is what the RSA algorithm, and all other asymmetric algorithms, is based
upon. The easy direction of computation in the one-way function that is used in the RSA algorithm is the process of
multiplying two large prime numbers. Multiplying the two numbers to get the resulting product is much easier than
factoring the product and recovering the two initial large prime numbers used to calculate the obtained product, which
is the difficult direction. RSA is based on the difficulty of factoring large numbers that are the product of two large prime
numbers. Attacks on these types of cryptosystems do not necessarily try every possible key value, but rather try to factor
the large number, which will give the attacker the private key.
When a user encrypts a message with a public key, this message is encoded with a one-way function (breaking a glass).
This function supplies a trapdoor (knowledge of how to put the glass back together), but the only way the trapdoor can
be taken advantage of is if it is known about and the correct code is applied. The private key provides this service. The
private key knows about the trapdoor, knows how to derive the original prime numbers, and has the necessary
programming code to take advantage of this secret trapdoor to unlock the encoded message (reassembling the broken
glass). Knowing about the trapdoor and having the correct functionality to take advantage of it are what make the
private key private.
When a one-way function is carried out in the easy direction, encryption and digital signature verification functionality
are available. When the one-way function is carried out in the hard direction, decryption and signature generation
functionality are available. This means only the public key can carry out encryption and signature verification and only
the private key can carry out decryption and signature generation.
As explained earlier in this chapter, work factor is the amount of time and resources it would take for someone to break
an encryption method. In asymmetric algorithms, the work factor relates to the difference in time and effort that
carrying out a one-way function in the easy direction takes compared to carrying out a one-way function in the hard
direction. In most cases, the larger the key size, the longer it would take for the bad guy to carry out the one-way
function in the hard direction (decrypt a message).
CA RA Certificate repository
Long periods of no repeating patterns within keystream values.Bits generated by the keystream must be random
Statistically unpredictable keystream The bits generated from the keystream generator cannot be predicted
A keystream not linearly related to the key If someone figures out the keystream values, that does not mean she now
knows the key value
Statistically unbiased keystream (as many 0s as 1s). There should be no dominance in the number of 0s or 1s in the
keystream
1- Public-key encryption
2- Digital signatures
3- Secure key exchange:
Q.What are the categories of security services? Briefly explain them . 5 marks
Solution:
PKI supplies the following security services:
Confidentiality Access control Integrity Authentication
Nonrepudiation
A PKI must retain a key history, which keeps track of all the old and current public keys that have been used by
individual users. For example, if Kevin encrypted a symmetric key with Daves old public key, there should be
a way for Dave to still access this data. This can only happen if the CA keeps a proper history of Daves old
certificates and keys.
Q22 Briefly describe the features of the Advanced Encryption Algorithm (Rijndael). [5]
The block sizes that Rijndael supports are 128, 192, and 256 bits. The number of rounds depends upon the size of the
block and the key length:
If both the key and block size are 128 bits, there are 10 rounds
If both the key and block size are 192 bits, there are 12 rounds
If both the key and block size are 256 bits, there are 14 rounds
Rijndael works well when implemented in software and hardware in a wide range of products and environments. It has
low memory requirements and has been constructed to easily defend against timing attacks.
Rijndael was NIST's choice to replace DES. It is now the algorithm required to protect sensitive but unclassified
government information.
Q24 List and briefly describe the fields that are part of a digital certificate. [10]
Version number: Version number of the X.509 standard. Most certificates follow
Version 3. Different versions have different fields.
Issuer: Name of the certificate authority (CA).
Serial Number: Unique serial number for the certificate, set by the CA.
Subject :The name of the person, organization, computer, or program to which the certificate has been issued. This is the
true party.
Public Key: The public key of the subject (the true party).
Public Key Algorithm: The algorithm the subject uses to sign messages with digital signatures
Valid Period:. The period before which and after which the certificate should not be used. Note: Certificate may be
revoked before the end of this period.
Digital Signature: The digital signature of the certificate, signed by the CA with the CAs own private key. For testing
certificate authentication and integrity. User must know the CAs public key independently.
Signature Algorithm Identifier: The digital signature algorithm the CA uses to sign its certificates.
Other Fields:
Q:25 If you are supposed to implement one-time pad encryption scheme, which requirements do you think, each
pad fulfill so that it is unbreakable?
A one-time pad is a perfect encryption scheme because it is considered unbreakable if implemented properly .
For a one-time pad encryption scheme to be considered unbreakable, each pad in the
scheme must be:
Made up of truly random values
Used only one time
Securely distributed to its destination
Secured at sender's and receiver's sites
At least as long as the message
Q:26 Differentiate between public key cryptography and public key infrastructure.
These algorithms are used to create public/private key pairs, perform key exchange or agreement, and generate and verify
digital signatures. Note that public key cryptography can only perform key agreement and cannot generate or verify
digital signatures.
Public key infrastructure (PKI) is different. It is not an algorithm, a protocol, or an application. It is an infrastructure based
on public key cryptography.
Q:27 What are the two basic functions used in encryption algorithms?
1.you are appointed as a network security personnel in an organisation, if u are using the symmetric key
encryption , what will be yours arguments in favour and against the use of this algorithm?5 marks
Solution:
14. Consider A 32-bit has function implemented as two 16-bit functions using XOR and RXOR. Is created
checksum by concatenation the both detects all the odd parity errors? Explain. If these functions are used
for authentication what will be the effectiveness of the authentication.
Consider a 32-bit hash function defined as the concatenation of two 16-bit functions: XOR and RXOR, which are defined
in Section 3.2 as two simple hash functions.
a. Will this checksum detect all errors caused by an odd number of error bits? Explain.
b. Will this checksum detect all errors caused by an even number of error bits? If not, characterize the error patterns that
will cause the checksum to fail.
c. Comment on the effectiveness of this function for use as a hash function for authentication.
Solution:
a. Yes. The XOR function is simply a vertical parity check. If there is an odd number of errors, then there must be
at least one column that contains an odd number of errors, and the parity bit for that column will detect the
error.
Note that the RXOR function also catches all errors caused by an odd number of error bits. Each RXOR bit is a
function of a unique spiral of bits in the block of data. If there is an odd number of errors, then there must be
at least one spiral that contains an odd number of errors, and the parity bit for that spiral will detect the error.
b. No. The checksum will fail to detect an even number of errors when both the XOR and RXOR functions fail. In
order for both to fail, the pattern of error bits must be at intersection points between parity spirals and parity
columns such that there is an even number of error bits in each parity column and even number of error bits in
each spiral.
c. It is too simple to be used as a secure hash function; finding multiple message with the same hash function
would be too easy.