All Assignments
All Assignments
All Assignments
4.Which protocol is commonly used for secure communication over a computer network?
a) HTTP
b) FTP
c) HTTPS (Correct) ✔️
d) UDP
5.In the context of network security, what does the term "phishing" refer to?
d) Configuring firewalls
B. Stateful inspection firewalls keep track of the state of active connections. (Correct) ✔️
a) Stateful inspection
b) Packet filtering
d) Proxy services
8.A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In
this scenario, one or more of the following security violations can take place.
II. A third party attacker can launch a birthday attack to replace m with a fraudulent message.
a) I and II (Correct) ✔️
b) I and III
c) II and IV
d) III ,II and I
9.In the RSA public key cryptosystem, the private and public keys are (e, n) and (d, n)
respectively, where n = p*q and p and q are large primes. Besides, n is public and p
and q are private. Let M be an integer such that 0 < M < n and f(n) = (p- 1)(q-1). Now
consider the following equations.
I. M’= Me mod n
M = (M’)d mod n
II. ed ≡ 1 mod n
10.A sender is employing public key cryptography to send a secret message to a receiver. Which one of t
a) Sender encrypts using receiver’s public key (Correct) ✔️
b) Sender encrypts using his own public key
c) Receiver decrypts using sender’s public key
d) Receiver decrypts using his own public key
a) P and R only
b) Q and R only
c) Q and S only (Correct) ✔️
d) R and S only
13.Suppose that everyone in a group of N people wants to communicate secretly with
the N–1 others using symmetric key cryptographic system. The communication between
any two persons should not be decodable by the others in the group. The number of
keys required in the system as a whole to satisfy the confidentiality requirement is
a) 2N
b) N(N – 1)
c) N(N – 1)/2 (Correct) ✔️
d) (N – 1)2
14.The minimum positive integer p such that 3p modulo 17 = 1 is
a) 5
b) 8
c) 12
d) 16 (Correct) ✔️
15.Exponentiation is a heavily used operation in public key cryptography. Which of the
following options is the tightest upper bound on the number of multiplications required
to compute bn mod m,0≤b,n≤m ?
a) O(logn) (Correct) ✔️
b) O(√n)
c) O(n/logn)
d) O(n)
16.MD5 is a widely used hash function for producing hash value of
a) 64 bits
b) 128 bits (Correct) ✔️
c) 512 bits
d) 1024 bits
A) Data encryption
C) Network monitoring
D) Firewall management
B) Private key
C) Symmetric key
D) Session key
a) SSL
b) TLS (Correct) ✔️
c) SHTTP
d) SET
Fill in the Blanks
2. A firewall is a security mechanism that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
3. In the context of network security, the acronym IDS stands for Intrusion Detection System.
4. Intrusion Detection Systems (IDS) can be categorized into two types: Signature based and Anomaly
based.
5.In a Virtual Private Network (VPN), tunneling protocol is used to create a secure and encrypted
connection over the Internet.
7. Simulation is often used to test the strength and effectiveness of cryptographic techniques in
various scenarios.
1. A Virtual Private Network (VPN) provides a secure communication channel over an untrusted
network such as the internet. - True
2. In a Denial of Service (DoS) attack, the attacker aims to gain unauthorized access to sensitive
information. - False
3. Single Sign-On (SSO) allows a user to log in once and gain access to multiple systems without re-
authenticating. – True
4. A digital certificate binds a public key to an individual, device, or service, providing a means of
verifying identities in a secure manner. – True
Question: Short Answer Type
3. Explain the concept of a Man-in-the-Middle (MitM) attack. Provide an example scenario and discuss
how it can be mitigated.
4. Explain the concept of Intrusion Detection Systems (IDS) and provide an example of how they
enhance network security.
5. If a bit error occurs in plain text block b1, how far does the error propagate in CBC mode of DES?
6. Provide an overview of symmetric key algorithms. What are the key types and modes used in these
algorithms?
8. Use Vigenere Cipher with key HEALTH to encrypt the message “Life is full of surprises”
10. Explain the usage of digital signature algorithm (DSA) to perform signing and verifying operations.
11. If you have a message with 60 characters and you use a transposition cipher with a key of 5, how
many different ways can the message be rearranged?
12. . Briefly explain the concept of biometric-based authentication and provide an example.
13. Explain the concept of a security token and how it enhances authentication in network security.
14.(a) Give the structure of AES. Explain how Encryption/Decryption is done in AES.
(b) Justify the statement-“Message encryption by itself can provide a measure of authentication
15. (a)Explain the architecture and security features of Kerberos for user authentication. Include an
analysis of how Kerberos mitigates common security threats:
(b) Describe various types of biometric authentication methods and discuss their effectiveness
and potential vulnerabilities in network security
Question: Long Answer Type
1. Explain the concept of a Virtual Private Network (VPN) and its applications in enhancing
network security. Discuss the key components of a VPN.
2. Discuss the importance of regular security audits in maintaining network security. Explain the
steps involved in conducting a network security audit and provide examples of potential
vulnerabilities that could be identified.
3. Describe the principles of the Defense-in-Depth strategy in network security. Provide
examples of multiple layers of defense mechanisms.
4. Users A and B use the Diffie Hellman key exchange technique, a common
prime q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3.What is A’s public key YA?
(ii) If user B has private key XB=6 What is B’s public key YB?
(iii) What is the shared secret key? Also write the algorithm.
5. Describe the steps in finding the message digest using SHA-512 algorithm. What is the order
of finding two messages having the same message digest?
6. Suppose that everyone in a group of N people wants to communicate secretly with the N - 1
others using symmetric key cryptographic system. The communication between any two
persons should not be decodable by the others in the group. How many number of keys
required in the system as a whole to satisfy the confidentiality
7. In asymmetric key cryptography, RSA commonly uses key lengths of 1024, 2048, or 4096 bits.
If you are using a 2048-bit RSA key, how many possible keys are there?
8. Discuss the potential pitfalls in security handshakes during the authentication process.
Provide examples and suggest measures to mitigate these pitfalls.
9. Compare and contrast certificate-based authentication and password-based authentication.
Highlight the strengths and weaknesses of each method.
10. Compare and contrast the cryptographic mechanisms employed in Secure Socket Layer (SSL)
and Transport Layer Security (TLS) protocols, highlighting their respective strengths and
vulnerabilities in ensuring secure communication over the internet.
11. A.) If you have a message with 60 characters and you use a transposition cipher with a key of
5, how many different ways can the message be rearranged?
B.) Suppose that everyone in a group of N people wants to communicate secretly with the N -
1 others using symmetric key cryptographic system. The communication between any two
persons should not be decodable by the others in the group. How many number of keys
required in the system as a whole to satisfy the confidentiality.
12. Users A and B use the Diffie Hellman key exchange technique, a common prime q=11 and a
primitive
root alpha=7. 5[CO4] [L2]
a) If user A has private key XA=3.What is A’s public key YA?
b) If user B has private key XB=6 What is B’s public key YB?
c) What is the shared secret key? Also write the algorithm.