Sunteți pe pagina 1din 8

ISSL ORAL QUESTIONS

1. What is a security mechanism?


Ans: A Security mechanism is any process that is designed to detect, prevent, or recover
from a security attack.
2. What is meant by threat?
Ans: A potential for violation of security, which exists when there is a circumstances,
capability, action or event that could breach security and cause harm. That is, a threat is a
possible danger that might exploit vulnerability.
. What is Enci!herment?
Ans: The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an
algorithm and zero or more encryption keys.
". What are the #$ur basic tas%s in &esi'nin' a !articu(ar security ser)ice?
Ans: our basic tasks in designing a particular security service are!
1. "esign an algorithm for performing the security#related transformation. The algorithm
should be such that an opponent cannot defeat its purpose.
$. %enerate the secret information to be used with the algorithm.
&. "evelop methods for the distribution and sharing of the secret information
'. Specify a protocol to be used by the two principals that makes use of the security
algorithm and the secret information to achieve a particular security.
*. What is a !assi)e attac%?
Ans: (assive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
Two types of passive attacks are release of message contents and traffic analysis
+. What is an acti)e attac%?
Ans: An active attack involves some modification of the data stream or the creation of a
false.
,. What are the as!ects $# in#$rmati$n security?
Ans: There are three aspects of the information security. i. e. Security attack, Security
mechanism, Security Service
-. List s$me c$mm$n in#$rmati$n inte'rity #uncti$ns?
Ans! )dentification, Authorization, *oncurrence, +iability, ,ndorsement, -alidation, Time
of occurrence, .egistration
.. /e#ine a threat?
Ans: A potential for violation of security, which exists when there is a circumstances,
capability, action or event that could breach security and cause harm. That is, a threat is a
possible danger that might exploit vulnerability.
10. /e#ine an attac%?
Ans: An attack on system security that derives from an intelligent threat! that is an
intelligent act that is a deliberate attempt to evade security services and violate the security
policy of a system.
11. List e s$me e1am!(e $# security attac%s?
%ain unauthorized access to information
"isavow responsibility or liability for information the cheater did originate.
,nlarge cheater/s legitimate license .
(ervert the function of software, typically by adding a covert function.
*ause others to violate a protocol by means of introducing incorrect information.
12. What are the essentia( in're&ients $# a symmetric ci!her?
Ans: A symmetric encryption scheme has five ingredients! (laintext, ,ncryption
algorithm, Secret 0ey, *ipher text, "ecryption algorithm.
1. What are the t2$ basic #uncti$ns use& in the encry!ti$n a('$rithm?
Ans: All the encryption algorithms are based on two general principles!
Substituti$n: )n which each element in the plaintext is mapped into another
element.
Trans!$siti$n: )n which elements in the plaintext are rearranged. The fundamental
requirement is that no information be lost.
1'. 3$2 many %eys are re4uire& #$r t2$ !e$!(e t$ c$mmunicate )ia a ci!her?
Ans: )f both sender and receiver use the same key, the system is referred as symmetric,
single#key, secret#key or conventional encryption. )f both sender and receiver use a
different key, the system is referred as asymmetric, two#key or public key encryption.
1*. What are the t2$ 'enera( a!!r$aches t$ attac%in' a ci!her?
Ans: The general two approaches for attacking a cipher
1. 5ry!tana(ysis: *ryptanalytic attacks rely on the nature of the algorithm plus
perhaps some knowledge of the general characteristics of the plaintext or even some
samples plaintext#cipher text pairs.
2. 6rute7#$rce attac%: The attacker tries every possible key on a piece of cipher text
until an intelligible translation into plaintext is obtained.
1+. /e#ine the 5aesar ci!her?
Ans: The *aesar cipher involves replacing each letter of the alphabet with the letter
standing three places down the alphabet .The alphabet is wrapped around, so that the
letter following 2 is A.
* 3 , 4p5 3 4p 6 &5 mod 4$75
The general *aesar cipher algorithm is
* 3 , 4p5 3 4p 6 k5 mod 4$75
8here k takes the value in the range 1 to $9
The decryption algorithm is
p 3 "4*5 3 4* # k5 mod 4$75
1:. /e#ine the m$n$a(!habetic ci!her?
Ans: A dramatic increase in the key space is achieved by allowing an arbitrary
substitution. There are $7; possible keys. )t is referred to as monoalphabetic substitution
cipher, because a single cipher alphabet is used per message.
1-. /e#ine the 8(ay#air ci!her?
Ans: The (layfair cipher treats the diagrams in the plaintext as single units and translates
these units into cipher text diagrams. This algorithm is based on the use of a 9 by 9
matrix of letters constructed using keyword.
1.. What is the &i##erence bet2een a m$n$a(!habetic ci!her an& a !$(ya(!habetic
ci!her?
Ans: )n monoalphabetic cipher single cipher alphabet is used per message. <ut in
polyalphabetic cipher there are multiple cipher text letters for each plaintext letter, one
for each unique letter of keyword.
20. What is !r$&uct ci!her?
Ans: (roduct cipher has the performance of two or more basic ciphers in sequence is such
a way that the final result or product is cryptographically stronger than any of the
component ciphers.
21. What is the &i##erence bet2een /i##usi$n an& 5$n#usi$n?
Ans: )n /i##usi$n the statistical structure of the plaintext is dissipated into long range
statistics of the cipher text. This is achieved by having each plaintext digit affect the value
of many cipher text digits. 5$n#usi$n seeks to make a relationship between the statistics of
the cipher text and the value of the encryption key as complex as possible. Thus even if the
attacker can get some handle on the statistics of the cipher text, the way in which the key
was used to produce that cipher text is so complex as to make it difficult to deduce the key.
22 E1!(ain the a)a(anche e##ect=
Ans: A desirable property of any encryption algorithm is that a small change in either the
plaintext or the key should produce a significant change in the ciphertext. )n particular, a
change ) one of the plaintext or one bit of the key should produce a change in many bits of
the cipher text.
$&. What is a brute #$rce attac%?
Ans! A brute force attack consists of trying every possible code, combination, or password
until you find the right one.
$'. What is /ES?
Ans! ",S is a symmetric cipher defined in ederal )nformation (rocessing 4)(S5 Standard
>umber '7 in 1?:: as the federal government approved encryption algorithm for sensitive
but non#classified information. ",S utilizes a 97#bit key. This key size is vulnerable to a
brute force attack using current technology.
$9. What are the E56 an& 565 9$&es?
Ans: 8hen we use a block cipher to encrypt a message of arbitrary length, we use
techniques that are known as modes of operation for the block cipher. )n ,*< mode, each
plaintext block is encrypted independently with the block cipher. ,*< mode is as secure as
the underlying block cipher. )n *<* mode, each plaintext block is exclusive#@.ed with
previous ciphertext block, then encrypted
2+. What are the 5:6 an& O:6 m$&es?
Ans: The *ipher eedback 4*<5 mode and the @utput eedback 4@<5 mode are two
more standard modes of operation for a block cipher. )n 5:6 mode, the previous ciphertext
block is encrypted and the output produced is combined with the plaintext block using
exclusive#or to produce the current ciphertext block. )t is possible to define *< mode so
that it uses feedback that is less than one full data block. O:6 mode is similar to the *<
mode except that the quantity exclusive#@.ed with each plaintext block is generated
independently of both the plaintext and ciphertext. The encryption of a plaintext block is
derived by taking the exclusive#@. of the plaintext block with the relevant data block.
2,.What is a cry!t$($'y?
Ans: *ryptology is the science which incorporates both cryptography and cryptanalysis.
$A. What is cry!tana(ysis?
Ans! *ryptanalysis is the science of making encrypted data unencrypted.
2... What are symmetric an& asymmetric ci!hers?
Ans! )n a symmetric cipher, both parties must agree on the encryption key in advance.
Symmetric systems are also known as shared secret systems or private key systems.
)n an asymmetric cipher, the key is negotiated between the parties during communication.
)n an asymmetric system, each person has two keys. @ne key, the public key, is shared
publicly. The second key, the private key, should never be shared with anyone.
0.What is the /i##ie73e((man %ey e1chan'e=
Ans: The purpose for this algorithm is to enable two users to exchange a key securely that
can then be used for subsequent encryption of messages. )t depends for its effectiveness on
the difficulty of computing discrete logarithms.
1.What is a !rime number?
Ans! A prime number is an integer that can only be divided without remainder by positive
and negative values of itself and 1.
2. /e#ine :ermat;s the$rem?
Ans! ermat/s theorem states that, if p is prime number and a is a positive integer not
divisible by p then a
p#1
3 1 4mod p5
. What is a tra!&$$r $ne72ay #uncti$n?
Ans: A trapdoor one#way function is a one#way function for which the inverse direction is
easy given a certain piece of information 4the trapdoor5, but difficult otherwise.
&'.Str$n' 8rimes are necessary in RSA?
Ans: )n the literature pertaining to .SA, it has often been suggested that in choosing a key
pair, one should use so#called BstrongB primes p and q to generate the modulus n. Strong
primes are those with certain properties that make the product n hard to factor by specific
factoring methodsC such properties have included, for example, the existence of a large
prime factor of p#1 and a large prime factor of p61. The reason for these concerns is that
some factoring methods are especially suited to primes p such that p #1 or p61 has only
small factorsC strong primes are resistant to these attacks.
&9. What is the E(<ama( 5ry!t$system?
Ans! The ,l%amal system is a public#key cryptosystem based on the discrete logarithm
problem. )t consists of both encryption and signature algorithms. The encryption algorithm
is similar in nature to the "iffie#Dellman key agreement protocol. The system parameters
consist of a prime p and an integer g, whose powers modulo p generate a large number of
elements, as in "iffie#Dellman. Alice has a private key a and a public key y, where
y 3 g
a
4mod p5. Suppose <ob wishes to send a message m to Alice. <ob first generates a
random number k less than p. De then computes y
1
3 g
k
4mod p5 and y
$
3 m xor y
k
, where
E@. denotes the bit#wise exclusive#or. <ob sends 4y
1
,y
$
5 to Alice.
+. What are E((i!tic 5ur)e 5ry!t$systems?
Ans! ,lliptic curve cryptosystems are analogs of public#key cryptosystems such as .SA
and ,l%amal in which modular multiplication is replaced by the elliptic curve addition
operation. The curves used in elliptic curve analogs of discrete logarithm cryptosystems
are normally of the form y
$
3 x
&
6 ax 6 b 4mod p5, where p is prime. The problem tapped
by the discrete logarithm analogs in elliptic curves is the elliptic curve logarithm problem,
defined as follows! given a point % on an elliptic curve with order r 4number of points on
the curve5 and another point F on the curve, find a unique x 4G x r # 15 such that F 3 x%,
i.e., F is the xth multiple of %.
&:. What is /i##erentia( 5ry!tana(ysis?
Ans! "ifferential cryptanalysis is a type of attack that can be mounted on iterative block
ciphers. "ifferential cryptanalysis is basically a chosen plaintext attack and relies on an
analysis of the evolution of the differences between two related plaintexts as they are
encrypted under the same key. <y careful analysis of the available data, probabilities can
be assigned to each of the possible keys and eventually the most probable key is identified
as the correct one.
-. What is Linear 5ry!tana(ysis?
Ans! +inear cryptanalysis is a known plaintext attack and uses a linear approximation to
describe the behavior of the block cipher. %iven sufficient pairs of plaintext and
corresponding ciphertext, bits of information about the key can be obtained and increased
amounts of data will usually give a higher probability of success.
. *<* mode is as secure as the underlying block cipher against standard attacks.
.. A(ice 2ants t$ 'enerate a !air $# RSA !ub(ic an& !ri)ate %eys. She starts by
se(ectin' t2$ !rimes ! = * an& 4 = ,.
a. 5$m!ute n> ?n@.
Ans! n 3 pq 3 9 x : 3 &9
4n5 3 4p#154q#15 3 49#154:#15 3 'x7 3 $'
b. In se(ectin' a &ecry!ti$n ?!ri)ate@ %ey &> A(ice &eci&es &= is n$t '$$&> 2hy?
She se(ects & = 11 instea&. Which is the c$rrect encry!ti$n ?!ub(ic@ %ey> e
1
= 11 $r
e
2
= 1 ?
Ans! d3& is not good because gcd4d, 4n55 3 gcd4&, $'5 is not 1.
e
1
3 11 is the correct encryption key because d e
1
3 11x1131$13 1 mod 4n5
c. Su!!$se 6$b 2ants t$ sen& a messa'e 9= t$ A(ice. Which %ey sh$u(& he use?
What;s the ci!herte1t he sen&s t$ A(ice?
Ans! * 3 H
e
mod > 3 4&&5
11
mod &9 3 4#$5
11
mod &9 3 #1A mod &9 3 1: mod &9
&. A#ter A(ice recei)es the ci!herte1t> h$2 &$es she &ecry!t?
Ans! H 3 *
d
mod > 3 41:5
11
mod &9 3 &&
e. I# A(ice 2ant t$ sen& 6 a si'ne& messa'e> 'i)en 9; = +> 2hat 2$u(& A(ice sen&?
Ans! Sign4H/5 3 4H/5
d
mod > 3 475
11
mod &9 3 7 I 4&75
9
mod &9 3 7 I 415
9
mod &9 3 7
#. 3$2 &$es 6$b )eri#y the messa'e is sent by A(ice?
Ans! H/ 3 4Sign4H/55
e
mod >
1". 5$nsi&er a /i##ie73e((man scheme 2ith a c$mm$n !rime 4 = 11 an& a
!rimiti)e r$$t =2. sh$2 that 2 is a !rimiti)e r$$t $# 11.
Ans:
$ mod 11 3 $
$
$
mod 11 3 '
$
&
mod 11 3 A
$
'
mod 11 3 9
$
9
mod 11 3 1G
$
7
mod 11 3 ?
$
:
mod 11 3 :
$
A
mod 11 3 &
$
?
mod 11 3 7
$
1G
mod 11 3 1 Since $
i
mod 11 for GJiJ11 contains all numbers from 1 to 11#1,
the size of this set is equal to 4q5, the order of q. Dence $ is a primitive root of
11.
b. I# user A has !ub(ic %ey A
A
= .> 2hat is A;s !ri)ate %ey B
A
?
rom the above values, $
7
mod 11 3 ?, therefore E
A
3 7.
c. I# user 6 has !ub(ic %ey A
6
= > 2hat is the share& secret %ey C?
0 3 4F
<
5
EA
mod q 3 4&5
7
mod 11 3 &
"0. :$r ($n' messa'es> RSA 2i(( be a!!(ie& in b($c%s. I# the b($c% is )ery sma((> say
it c$ntains $n(y $ne (etter in each b($c%> 2i(( the encry!ti$n be secure?
Ans: N$. )f the block contains only one letter, then each letter will be mapped to a
fixed replacement. Thus it will become a substitution cipher 4e.g. Honoalphabetic
Substitution5, and the cipher can be broken using frequency analysis.
"1.What are the essentia( in're&ients $# a !ub(ic7%ey &irect$ry?
Ans:
The authority maintains a directory with a entry for each participant.
,ach participant registers a public key with the directory authority.
A participant may replace the existing key with a new one at any time.
(eriodically, the authority publishes the entire directory or updates to the directory.
(articipants could also access the directory electronically.
"2. What is !ub(ic7%ey certi#icate?
Ans: The public#key authority could be a bottleneck in the system, for a Kser must appeal
to the authority for a public key for every other user that it wishes to contact. As before
the directory of names and public keys maintained by the authority is vulnerable to
tempering.
".What are the re4uirements #$r the use $# a !ub(ic7%ey certi#icate scheme?
Ans:
Any participant can read a certificate to determine the name and public key of
the certificate/s owner.
Any participant can verify that the certificate originated from the certificate
authority and is not counterfeit.
@nly the certificate authority can create and update certificates.
Any participant can verify the currency of the certificate.
"".What is the Li#e 5yc(e $# a Cey?
Ans: 0eys have limited lifetimes for a number of reasons. The most important reason is
protection against cryptanalysis. ,ach time the key is used, it generates a number of
ciphertexts. ord describes the life cycle of a key as follows!
key generation and possibly registration for a public key
key distribution
key activationLdeactivation
key replacement or key update
key revocation
key termination, involving destruction and possibly archival
"*. What is a 3ash :uncti$n?
Ans: A hash function D is a transformation that takes a variable#size input m and returns a
fixed#size string, which is called the hash value h 4that is, h 3 D4m55. Dash functions with
Must this property have a variety of general computational uses, but when employed in
cryptography the hash functions are usually chosen to have some additional properties.
The basic requirements for a cryptographic hash function are!
the input can be of any length,
the output has a fixed length,
D4x5 is relatively easy to compute for any given x ,
D4x5 is one#way,
D4x5 is collision#free.
"+.What ty!es $# attac%s are a&&resse& by messa'e authenticati$n?
Ans:
5$ntent m$&i#icati$n: 7 *hanges to the contents of the message
Se4uence m$&i#icati$n: 7 Any modification to a sequence of messages between
parties, including insertion, deletion, and reordering.
Timin' m$&i#icati$n: 7 "elay or replay of messages.
",. What is the use $# &i'ita( si'nature?
Ans! "ata appended to, or a data unit that allows a recipient of the data unit to prove the
source and integrity if the data unit and protect against forgery
'A.What t2$ (e)e(s $# #uncti$na(ity c$m!rise a messa'e authenticati$n $r &i'ita(
si'nature mechanism?
Ans: Two levels of functionality comprise a message authentication or digital signature
mechanisms are +ow#level authentication and Digher#level authentication. At the lower
level there must be some sort of function that produces an authenticator! a value to be used
to authenticate a message. This lower level function is then used as primitive in a higher#
level authentication protocol that enables a receiver to verify the authenticity of message.
"..What is a messa'e authenticati$n c$&e?
Ans: An alternative authentication technique involves the use of a small fixed size block of
data, known as a cryptographic checksum or HA* that is appended to the message.
*0.What is the &i##erence bet2een a messa'e authenticati$n c$&e an& a $ne72ay hash
#uncti$n?
Ans: The difference between an HA* and a one#way hash function is that unlike an HA*,
a hash code does not use a key but is a function only of the input message.
91.Is it necessary t$ rec$)er the secret %ey in $r&er t$ attac% a 9A5 a('$rithm?
Ans: A number of keys will produce the correct HA* and the opponent has no way of
knowing which the correct key is. @n an average $
4n#k5
keys produce a match. Therefore
attacks do not require the discovery of the key.
*2.What is the &i##erence bet2een a str$n' an& a 2ea% c$((isi$n resistance?
Ans:
or any given value h it is computationally infeasible to find yLx with D4y53D4x5.This is
Nweak collision resistanceO. )t is a one#way property. )t is easy to generate a code given
a message, but almost impossible to do the reverse.
)t is computationally infeasible to find any pair4x,y5 such that D4x53D4y5.This is Nstrong
collision resistanceO. This guarantees that an alternative message hashing to the same
value as a given message cannot be found. This prevents forgery.
9&.What is the #uncti$n $# a c$m!ressi$n #uncti$n in a hash #uncti$n?
Ans: The hash function involves repeated use of a compression function. The motivation
is that if the compression function is collision resistant, then the hash function is also
collision resistant function. So a secure hash function can be produced.
*". What is a birth&ay attac%?
Ans! A birthday attack is a name used to refer to a class of brute#force attacks. )t gets its
name from the surprising result that the probability that two or more people in a group of
$& share the same birthday is greater than 1L$C such a result is called a birthday paradox.
**. What is the uti(ity $# a &etache& si'nature?
Ans: A detached signature may be stored and transmitted separately from the message
it signs. This is useful in several contexts. A user may wish to maintain a separate
signature log of all messages sent or received. A detached signature of an executable
program can detect subsequent virus infection. inally detached signature can be used
when more than one party must sign a document, such as legal contract.
*+. Why &$es 8<8 'enerate a si'nature be#$re a!!(yin' c$m!ressi$n?
Ans: The signature is generated before compression due to $ reasons!
1. )t is preferable to sign an uncompressed message so that one can store only the
uncompressed message together with the signature for future verification
$. ,ven if one were willing to generate dynamically a recompressed message for
verification, (%(/s compression algorithm presents a difficulty
*,. Why is R +" c$n)ersi$n use#u( #$r emai( 'enerati$n?
Ans: The .adix 7' conversion is performed before the segmentation of the messages
take place. The use of radix 7' is that it converts he input stream to &&P. The radix 7'
converts the input stream to a radix 7' format
*-. What is 9I9E?
1. Ans: Hultipurpose )nternet Hail ,xtensions 4H)H,5 is an extension to the .*
A$$ framework that is intended to address some of the problems and limitations of
these uses of SHT(.
*.. What is SD9I9E?
Ans: SecureLHultipurpose )nternet Hail ,xtension is a security enhancement to the
H)H, )nternet e#mail format standard, based on technology from .SA "ata Security.
)t is ability to sign andLor encrypt messages.
7G. What ser)ices are !r$)i&e& by I8Sec?
Ans: Services provided by )(Sec
Access control
*onnectionless integrity
"ata origin authentication
.eMection of replayed packets
+1. What is the &i##erence bet2een Trans!$rt m$&e an& Tunne( m$&e?
Ans:
Trans!$rt m$&e Tunne( m$&e
1. )t provides protection for upper
layer protocols.
$. Ksed for end#to#end
communication between two host
&. AD! Authenticates )( payload
and selected portions of )( header
and )(v7 extension header
1. )t provides protection to the entire )(
packet.
$. )t is used when one or both ends of an
SA is a security gateway, such as
firewall or router that implement )(Sec.
&. Authenticates entire inner )( packet plus
selected portions of outer )( header and
outer )(v7 extension headers.
+2. What is re!(ay attac%?
Ans: A replay attack is one which an attacker obtains a copy of an authenticated packet
and later transmits it to the intended destination.

S-ar putea să vă placă și