Cs707 Current Past Viva Solved Questions1
Cs707 Current Past Viva Solved Questions1
Cs707 Current Past Viva Solved Questions1
H_A_Tariq [email protected]
Symmetric Cryptography
• In a cryptosystem that uses symmetric cryptography, the sender and receiver use two instances of the same
key for encryption and decryption, as shown in the Figure
Asymmetric Cryptography
• In symmetric key cryptography, a single secret key is used between entities, whereas in public key systems,
each entity has different keys, or asymmetric keys
Services of Cryptosystems
• Confidentiality
Renders the information unintelligible except by authorized entities
• Integrity
Data has not been altered in an unauthorized manner since it was created, transmitted, or stored
• Authentication
Verifies the identity of the user or system that created information
• Authorization
Upon proving identity, the individual is then provided with the key or password that will allow access to some
resource
• Nonrepudiation
Ensures that the sender cannot deny sending the message.
1. What is intrusion “detection” & “Prevention”?
Intrusion“detection” is the process of monitoring the events occurring in a computer system or network
and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of
computer security policies.ORAn intrusion detection system (IDS) is a device or software application that
monitors a network or systems for malicious activity or policy violations.
Intrusion Prevention System (IPS):
The main functions of intrusion prevention systems are to identify malicious activity, log information
about said activity, attempt to block/stop activity, and report activity.
2. End to end encryption :
(E2EE) is a method of secure communication that prevents third-parties from accessing data while it's
transferred from one end system or device to another.
3. Link encryption:
Link encryption encrypts all the data along a specificCommunication path, as in a satellite link, T3 line, or
telephone circuit. Not only is the user information encrypted, but the header, trailers, addresses, and
routing data that are part of the packets are also encrypted. Link encryption provides protection against
packet sniffers and eavesdroppers.ORLink encryption is an approach to communications security that
encrypts and decrypts all traffic at each end of a communications line
2 link to link encryption
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a
communications line
Cryptosystem
Hardware or software implementation of cryptography that transforms a message to ciphertext and back to
plaintext
Confidentiality means that people cannot read sensitive information, either while it is on a computer or while it
is traveling across a network.
◦ Integrity
Integrity means that attackers cannot change or destroy information, either while it is on a computer or
while it is traveling across a network.
Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore
destroyed data.
◦ Availability
Asymmetric vs Symmetric Encryption Which one is better?
Availability means that people who are authorized to use information are not prevented from doing so
Generally asymmetric encryption schemes are more secure because they require both a public and a private
key.
Symmetric encryption is less expensive than asymmetric encryption. Expensive as in it requires less
processing. To be exact, I am referring to the decryption process.
AES was to be a symmetric block cipher supporting key sizes of 128, 192, and 256 bits.