Uploaded by Parcious Verma

Information security

advertisement
AmanVerma
Q.Diffrentiate Active and Passive Security Attacks
Active Attacks: Active attacks are the type of attacks in which, The attacker
efforts to change or modify the content of messages. Active Attack is danger
for Integrity as well as availability. Due to active attack system is always
damaged and System resources can be changed. The most important thing
is that, In active attack, Victim gets informed about the attack.
Passive Attacks: Passive Attacks are the type of attacks in which, The
attacker observes the content of messages or copy the content of messages.
Passive Attack is a danger for Confidentiality. Due to passive attack, there is
no any harm to the system. The most important thing is that In passive
attack, Victim does not get informed about the attack.
Q.How many keys are required for two people to communicate via a
symmetric cipher?
Sender and receiver use the same key, so only one key is required.
In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice
and Bob) have two keys of their own — just to be clear, that's four keys total.
Q.What is the importance of Modular arithmetic in
cryptography?
1
AmanVerma
Modular arithmetic is a structure of arithmetic for integers, where numbers "wrap
around" upon reaching a specific value. Modular arithmetic enables us to simply
make groups, rings and fields which are the basic constructing piece of most
modern public-key cryptosystems.
For instance, Diffie-Hellman need the multiplicative group of integers modulo a
prime pp. There are different groups which can work. Modular or clock arithmetic is
arithmetic on a circle rather than a number line modulo N, it can use only the twelve
entire numbers from 0 through N-1.
Modular arithmetic is very well understood in method of algorithms for several basic
operations. That is one of the reason why it can use finite fields (AES) in symmetric
key cryptography. Cryptography needed complex problems. Some problems
develop into a hard with modular arithmetic.
For example, logarithms are simply to calculate over all integers but can become
hard to compute when it can introduce a modular reduction. Similarly with
discovering roots. Mod-arithmetic is the central mathematical terms in cryptography.
1. As mentioned, modular arithmetic allows groups. See @mikeazo's answer.
2. Cryptography requires hard problems. Some problems become hard with modular
arithmetic. For example, logarithms are easy to compute over all integers (and reals),
but can become hard to compute when you introduce a modular reduction. Similarly with
finding roots.
3. Cryptography is implemented digitally. It is nice if values can't be of arbitrary size. If you
work with modular arithmetic, you have guarantees about the largest value you will see and
can allocate the correct amount of space to hold values.
Q.Annote the technical details of Firewall and describe any three types
of Firewall with neat diagram
A firewall is a security tool that monitors incoming and/or outgoing network traffic to
detect and block malicious data packets based on predefined rules, allowing only
legitimate traffic to enter your private network. Implemented as hardware, software,
or both, firewalls are typically your first line of defense against malware, viruses, and
attackers trying to make it to your organization’s internal network and systems.
The major purpose of the network firewall is to protect an inner network by
separating it from the outer network. Inner Network can be simply called a
network created inside an organization and a network that is not in the range
of inner network can be considered as Outer Network.
Types of Network Firewall :
1. Packet Filters –
It is a technique used to control network access by monitoring outgoing
and incoming packets and allowing them to pass or halt based on the
source and destination Internet Protocol (IP) addresses, protocols, and
ports. This firewall is also known as a static firewall.
2
AmanVerma
2. Stateful Inspection Firewalls –
It is also a type of packet filtering which is used to control how data
packets move through a firewall. It is also called dynamic packet filtering.
These firewalls can inspect that if the packet belongs to a particular
session or not. It only permits communication if and only if, the session is
perfectly established between two endpoints else it will block the
communication.
3. Application Layer Firewalls –
These firewalls can examine application layer (of OSI model) information
like an HTTP request. If finds some suspicious application that can be
responsible for harming our network or that is not safe for our network
then it gets blocked right away.
3
AmanVerma
4. Next-generation Firewalls –
These firewalls are called intelligent firewalls. These firewalls can perform
all the tasks that are performed by the other types of firewalls that we
learned previously but on top of that, it includes additional features like
application awareness and control, integrated intrusion prevention, and
cloud-delivered threat intelligence.
5. Circuit-level gateways –
A circuit-level gateway is a firewall that provides User Datagram Protocol
(UDP) and Transmission Control Protocol (TCP) connection security and
works between an Open Systems Interconnection (OSI) network model‘s
transport and application layers such as the session layer.
Working of Firewalls :
4
AmanVerma
Firewalls can control and monitor the amount of incoming or outgoing traffic
of our network. The data that comes to our network is in the forms of
packets(a small unit of data), it is tough to identify whether the packet is safe
for our network or not, this gives a great chance to the hackers and intruders
to bombard our networks with various viruses, malware, spam, etc.
How to prevent network?
A network firewall applies a certain set of rules on the incoming and outgoing
network traffic to examine whether they align with those rules or not.
If it matches – then the traffic will be allowed to pass through your
network.
 If it doesn’t match– then the firewall will block the traffic.
This way, the network remains safe and secure.

Advantages of Network Firewall :
1. Monitors network traffic –
A network firewall monitors and analyzes traffic by inspecting whether the
traffic or packets passing through our network is safe for our network or
not. By doing so, it keeps our network away from any malicious content
that can harm our network.
2. Halt Hacking –
In a society where everyone is connected to technology, it becomes more
important to keep firewalls in our network and use the internet safely.
3. Stops viruses –
Viruses can come from anywhere, such as from an insecure website, from
a spam message, or any threat, so it becomes more important to have a
strong defense system (i.e. firewall in this case), a virus attack can easily
shut off a whole network. In such a situation, a firewall plays a vital role.
4. Better security –
If it is about monitoring and analyzing the network from time to time and
establishing a malware-free, virus-free, spam-free environment so
network firewall will provide better security to our network.
5. Increase privacy –
By protecting the network and providing better security, we get a network
that can be trusted.
Disadvantages of Network Firewall :
1. Cost –
Depending on the type of firewall, it can be costly, usually, the hardware
firewalls are more costly than the software ones.
2. Restricts User –
Restricting users can be a disadvantage for large organizations, because
of its tough security mechanism. A firewall can restrict the employees to
5
AmanVerma
do a certain operation even though it‘s a necessary operation.
3. Issues with the speed of the network –
Since the firewalls have to monitor every packet passing through the
network, this can slow down operations needed to be performed, or it can
simply lead to slowing down the network.
4. Maintenance –
Firewalls require continuous updates and maintenance with every change
in the networking technology. As the development of new viruses is
increasing continuously that can damage your system.
 What is cryptanalysis?
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the
aim of understanding how they work and finding and improving techniques
for defeating or weakening them. For example, cryptanalysts seek to
decrypt ciphertexts without knowledge of the plaintext source, encryption
key or the algorithm used to encrypt it; cryptanalysts also target
secure hashing, digital signatures and other cryptographic algorithms.
For example, a cipher with a 128 bit encryption key can have 2128 (or
340,282,366,920,938,463,463,374,607,431,768,211,456) unique keys; on average,
a brute force attack against that cipher will succeed only after trying half of those
unique keys. If cryptanalysis of the cipher reveals an attack that can reduce the
number of trials needed to 240 (or just 1,099,511,627,776) different keys, then the
algorithm has been weakened significantly, to the point that a brute-force attack
would be practical with commercial off-the-shelf systems.
 What is cryptology?
Cryptology is the mathematics, such as number theory and the application
of formulas and algorithms, that underpin cryptography and cryptanalysis.
Cryptanalysis concepts are highly specialized and complex, so this
discussion will concentrate on some of the key mathematical concepts
behind cryptography, as well as modern examples of its use.
In order for data to be secured for storage or transmission, it must be
transformed in such a manner that it would be difficult for an unauthorized
6
AmanVerma
individual to be able to discover its true meaning. To do this, security
systems and software use certain mathematical equations that are very
difficult to solve unless strict criteria are met. The level of difficulty of
solving a given equation is known as its intractability. These equations form
the basis of cryptography
Modern cryptology examples
Symmetric-key cryptography. Symmetric-key cryptography, sometimes
referred to as secret-key cryptography, uses the same key to encrypt and
decrypt data. Encryption and decryption are inverse operations, meaning
the same key can be used for both steps. Symmetric-key cryptography's
most common form is a shared secret system, in which two parties have a
shared piece of information, such as a password or passphrase, that they
use as a key to encrypt and decrypt information to send to each other.
Public-key cryptography. Public-key cryptography is a cryptographic
application that involves two separate keys -- one private and one public.
While both keys are mathematically related to one another, only the public
key can be used to decrypt what has been encrypted with the private key.
The most well-known application of public-key cryptography is for digital
signatures, which allow users to prove the authenticity of digital messages
and documents. It also makes it possible to establish secure
communications over insecure channels.
Q.Genranalize the security services classification and security
mechanism in detail

Network Security is field in computer technology that deals with
ensuring security of computer network infrastructure. As the network is
very necessary for sharing of information whether it is at hardware
level such as printer, scanner, or at software level. Therefore security
mechanism can also be termed as is set of processes that deal with
recovery from security attack. Various mechanisms are designed to
recover from these specific attacks at various protocol layers.
7
AmanVerma
Types of Security Mechanism are :
1. Encipherment :
This security mechanism deals with hiding and covering of data which
helps data to become confidential. It is achieved by applying
mathematical calculations or algorithms which reconstruct information into
not readable form. It is achieved by two famous techniques named
Cryptography and Encipherment. Level of data encryption is dependent
on the algorithm used for encipherment.
2. Access Control :
This mechanism is used to stop unattended access to data which you are
sending. It can be achieved by various techniques such as applying
passwords, using firewall, or just by adding PIN to data.
3. Notarization :
This security mechanism involves use of trusted third party in
communication. It acts as mediator between sender and receiver so that if
any chance of conflict is reduced. This mediator keeps record of requests
made by sender to receiver for later denied.
4. Data Integrity :
This security mechanism is used by appending value to data to which is
created by data itself. It is similar to sending packet of information known
to both sending and receiving parties and checked before and after data
is received. When this packet or data which is appended is checked and
is the same while sending and receiving data integrity is maintained.
5. Authentication exchange :
This security mechanism deals with identity to be known in
communication. This is achieved at the TCP/IP layer where two-way
handshaking mechanism is used to ensure data is sent or not
6. Bit stuffing :
This security mechanism is used to add some extra bits into data which is
being transmitted. It helps data to be checked at the receiving end and is
achieved by Even parity or Odd Parity.
7. Digital Signature :
This security mechanism is achieved by adding digital data that is not
visible to eyes. It is form of electronic signature which is added by sender
which is checked by receiver electronically. This mechanism is used to
preserve data which is not more confidential but sender‘s identity is to be
notified.
8
AmanVerma
Security services

Authentication: assures recipient that the message is from the source that
it claims to be from.

Access Control: controls who can have access to resource under
what condition

Availability: available to authorized entities for 24/7.

Confidentiality: information is not made available to unauthorized individual

Integrity: assurance that the message is unaltered

Non-Repudiation: protection against denial of sending or receiving in the
communication
Q.What is confidentiality an important principle of
security?
Confidentiality measures are designed to protect against unauthorized
disclosure of information. The objective of the confidentiality principle is to ensure
that private information remains private and that it can only be viewed or accessed
by individuals who need that information in order to complete their job duties
For example, examples of Confidentiality can be found in various access control methods,
like two-factor authentication, passwordless sign-on, and other access controls, but it's not
just about letting authorized users in, it's also about keeping certain files inaccessible.
9
AmanVerma
Q.What is CIA in Cyber Security?
The CIA Triad is an information security model, which is widely popular. It guides an
organization‘s efforts towards ensuring data security. The three principles—
confidentiality, integrity, and availability which is also the full for CIA in cybersecurity,
form the cornerstone of a security infrastructure. In fact, it is ideal to apply these
principles to any security program.

Confidentiality makes sure that only authorized personnel are given access or
permission to modify data

Integrity helps maintain the trustworthiness of data by having it in the correct state
and immune to any improper modifications

Availability means that the authorized users should be able to access data
whenever required
The CIA Triad is so elementary to information security that anytime data violation or
any number of other security incidents occur, it is definitely due to one or more of
these principles being compromised. So, the CIA Triad is always on top of the
priority list for any infosec professional.
Security experts assess threats and vulnerabilities thinking about the impact that
they might have on the CIA of an organization‘s assets. Based on that assessment,
the security team enforces a specific set of security controls to minimize the risks
within that environment.
Knowing the CIA is a must for Cyber Security. But to learn more than this,
enroll in Cyber Security Course in Bangalore now.
10
AmanVerma
Examples of CIA Triad
To have a better understanding of how the CIA Triad works in practice, consider an
ATM that allows users to access bank balances and other information. An ATM
incorporates measures to cover the principles of the triad:

The two-factor authentication (debit card with the PIN code)
provides confidentiality before authorizing access to sensitive data.

The ATM and bank software ensure data integrity by maintaining all transfer and
withdrawal records made via the ATM in the user‘s bank accounting.

The ATM provides availability as it is for public use and is accessible at all times
Q.Substitution cipher technique and Transposition cipher
technique are the types of Traditional cipher which are used to convert
the plain text into cipher text.
 Substitution Cipher Technique:
In Substitution Cipher Technique plain text characters are replaced
with other characters, numbers and symbols as well as in substitution
Cipher Technique, character‘s identity is changed while its position
remains unchanged.
 Transposition Cipher Technique:
Transposition Cipher Technique rearranges the position of the plain
text‘s characters. In transposition Cipher Technique, The position of
the character is changed but character‘s identity is not changed.

11
AmanVerma
12
AmanVerma
Q.Data encryption standard (DES) has been found vulnerable to
very powerful attacks and therefore, the popularity of DES has been found
slightly on the decline. DES is a block cipher and encrypts data in blocks of
size of 64 bits each, which means 64 bits of plain text go as the input to
DES, which produces 64 bits of ciphertext. The same algorithm and key are
used for encryption and decryption, with minor differences. The key length
is 56 bits. The basic idea is shown in the figure
Q.What Is Steganography?
A steganography technique involves hiding sensitive information within an ordinary,
non-secret file or message, so that it will not be detected. The sensitive information
13
AmanVerma
will then be extracted from the ordinary file or message at its destination, thus
avoiding detection. Steganography is an additional step that can be used in
conjunction with encryption in order to conceal or protect data.
Steganography is a means of concealing secret information within (or even on top of)
an otherwise mundane, non-secret document or other media to avoid detection. It
comes from the Greek words steganos, which means ―covered‖ or ―hidden,‖ and
graph, which means ―to write.‖ Hence, ―hidden writing.‖
You can use steganography to hide text, video, images, or even audio data. It‘s a
helpful bit of knowledge, limited only by the type of medium and the author‘s
imagination.
Steganography Techniques Explained
Now that we have a better grasp on what steganography is, what forms it comes in,
and who uses it, let‘s take a closer look at a sample of the available techniques.

Secure Cover Selection
Secure Cover Selection involves finding the correct block image to carry malware.
Then, hackers compare their chosen image medium with the malware blocks. If an
image block matches the malware, the hackers fit it into the carrier image, creating
an identical image infected with the malware. This image subsequently passes
quickly through threat detection methods.

Least Significant Bit
That phrase almost sounds like a put-down, doesn‘t it? However, in this case, it
refers to pixels. Grayscale image pixels are broken into eight bits, and the last bit,
the eighth one, is called the Least Significant Bit. Hackers use this bit to embed
malicious code because the overall pixel value will be reduced by only one, and the
human eye can‘t detect the difference in the image. So, no one is even aware that
anything is amiss, and that the image is carrying something dangerous within.

Palette-Based Technique
Like the Least Significant Bit technique, the Palette-Based Technique also relies on
images. Hackers embed their message in palette-based images such as GIF files,
making it difficult for cybersecurity threat hunters or ethical hackers to detect the
attack.
14
AmanVerma
Q.Explain block diagram of fiestel cypher
Q.Block Cipher modes of Operation
Electronic Code Book (ECB) –
Electronic code book is the easiest block cipher mode of functioning. It is
easier because of direct encryption of each block of input plaintext and
output is in form of blocks of encrypted ciphertext. Generally, if a message is
larger than b bits in size, it can be broken down into a bunch of blocks and
the procedure is repeated.
Procedure of ECB is illustrated below:
15
AmanVerma
Advantages of using ECB –
 Parallel encryption of blocks of bits is possible, thus it is a faster way of
encryption.
 Simple way of the block cipher.
Disadvantages of using ECB –
 Prone to cryptanalysis since there is a direct relationship between
plaintext and ciphertext.
Cipher Block Chaining –
Cipher block chaining or CBC is an advancement made on ECB since ECB
compromises some security requirements. In CBC, the previous cipher block
is given as input to the next encryption algorithm after XOR with the original
plaintext block. In a nutshell here, a cipher block is produced by encrypting
an XOR output of the previous cipher block and present plaintext block.
The process is illustrated here:
16
AmanVerma
Advantages of CBC –
 CBC works well for input greater than b bits.
 CBC is a good authentication mechanism.
 Better resistive nature towards cryptanalysis than ECB.
Disadvantages of CBC –
 Parallel encryption is not possible since every encryption requires a
previous cipher.
Cipher Feedback Mode (CFB) –
In this mode the cipher is given as feedback to the next block of encryption
with some new specifications: first, an initial vector IV is used for first
encryption and output bits are divided as a set of s and b-s bits.The left-hand
side s bits are selected along with plaintext bits to which an XOR operation is
applied. The result is given as input to a shift register having b-s bits to lhs,s
bits to rhs and the process continues. The encryption and decryption process
for the same is shown below, both of them use encryption algorithms.
Advantages of CFB –
 Since, there is some data loss due to the use of shift register, thus it is
difficult for applying cryptanalysis.
Disadvantages of using ECB –
 The drawbacks of CFB are the same as those of CBC mode. Both block
losses and concurrent encryption of several blocks are not supported by
the encryption. Decryption, however, is parallelizable and loss-tolerant.
Output Feedback Mode –
The output feedback mode follows nearly the same process as the Cipher
17
AmanVerma
Feedback mode except that it sends the encrypted output as feedback
instead of the actual cipher which is XOR output. In this output feedback
mode, all bits of the block are sent instead of sending selected s bits. The
Output Feedback mode of block cipher holds great resistance towards bit
transmission errors. It also decreases the dependency or relationship of the
cipher on the plaintext.
Advantages of OFB –
 In the case of CFB, a single bit error in a block is propagated to all
subsequent blocks. This problem is solved by OFB as it is free from bit
errors in the plaintext block.
Disadvantages of OFB The drawback of OFB is that, because to its operational modes, it is more
susceptible to a message stream modification attack than CFB.
Counter Mode –
The Counter Mode or CTR is a simple counter-based block cipher
implementation. Every time a counter-initiated value is encrypted and given
as input to XOR with plaintext which results in ciphertext block. The CTR
mode is independent of feedback use and thus can be implemented in
parallel.
Its simple implementation is shown below:
18
AmanVerma
Advantages of Counter –

Since there is a different counter value for each block, the direct plaintext
and ciphertext relationship is avoided. This means that the same plain
text can map to different ciphertext.
 Parallel execution of encryption is possible as outputs from previous
stages are not chained as in the case of CBC.
Disadvantages of Counter The fact that CTR mode requires a synchronous counter at both the
transmitter and the receiver is a severe drawback. The recovery of
plaintext is erroneous when synchronisation is lost.
Q.describe the digital signature algorithm and for how
signing and verification is done using DSS
A digital signature is a mathematical technique used to validate the authenticity
and integrity of a message, software or digital document. It's the digital equivalent
of a handwritten signature or stamped seal, but it offers far more inherent security.
A digital signature is intended to solve the problem of tampering and
impersonation in digital communications.
Digital signatures can provide evidence of origin, identity and status of electronic
documents, transactions or digital messages. Signers can also use them to
acknowledge informed consent.
19
AmanVerma
In many countries, including the United States, digital signatures are considered
legally binding in the same way as traditional handwritten document signatures.
How do digital signatures work?
Digital signatures are based on public key cryptography, also known
as asymmetric cryptography. Using a public key algorithm, such as RSA
(Rivest-Shamir-Adleman), two keys are generated, creating a
mathematically linked pair of keys, one private and one public.
Digital signatures work through public key cryptography's two mutually
authenticating cryptographic keys. The individual who creates the digital
signature uses a private key to encrypt signature-related data, while the
only way to decrypt that data is with the signer's public key.
If the recipient can't open the document with the signer's public key, that's a
sign there's a problem with the document or the signature. This is how
digital signatures are authenticated.
Digital signature technology requires all parties trust that the individual
creating the signature has kept the private key secret. If someone else has
access to the private signing key, that party could create fraudulent digital
signatures in the name of the private key holder.
20
AmanVerma
users A and B use the Diffie-Hellman key,exchange technique with a
common prime q=71and a primitive root as a=74)If user has private key
xA=5,what isA's public key YA?5) If user B has private key XB=12, what
isB's public key YB?6) What is the shared secret key?
Answer:
a. If user A has private key XA=5, what is A’s public key YA?
Ya =7^5 mod 71 = 51
b. If user B has private key XB=12, what is B’s public key YB?
Yb = 7^12 mod 71 = 4
c.What is the shared secret key?
YK = 4^5 mod 71 = 30
21
AmanVerma
Question 10.1:
Alice and Bob use the Diffie–Hellman key exchange technique with a common
prime
q = 1 5 7 and a primitive root a = 5.
a. If Alice has a private key XA = 15, find her public key YA.
b. If Bob has a private key XB = 27, find his public key YB.
c. What is the shared secret key between Alice and Bob?
Solution:
We are given that q= 157 and a primitive rot a=5.
1. If Alice has a private key XA=15, find her public key YA.
So, public key for Alice will be given as
YA= (a) xa Mod (q)
= (5)15 mod (157)
= 79
1. If Bob has a private key XB = 27, find his public key YB.
So, public key for Bob will be given as
YB= (a) xb mod (q)
= (5)27 mod (157)
= 65
1. What is the shared secret key between Alice and Bob.
Shared key (for Alice) = (YB) xa mod (157)
= (65)15 mod (157)
= 78
Shared key (for bob) = (YA) xb mod (q)
= (79)27 mod (157)
= 78
22
AmanVerma
Thus, shared secret key between Alice and Bob is 78.
Question 10.2:
Alice and Bob use the Diffie-Hellman key exchange technique with a common
prime q = 2 3 and a primitive root a = 5 . a. If Bob has a public key YB = 1 0 ,
what is Bob’s private key YB? b. If Alice has a public key YA = 8 , what is the
shared key K with Bob? c. Show that 5 is a primitive root of 23.
Solution:
1. If Bob has a public key YB = 1 0 , what is Bob‘s private key YB.
Given common prime q = 23
Primitive root a = 5
Bob has a public key YB= 10
Bob‘s private key BX = ?
YB = aXB (mod 23)
YB = 5XB (mod 23) (∴ q=23)
10 = 5XB (mod 23)
∴51 mod 23 = 5
52 mod 23 = 25 mod 23 = 2
53 mod 23 = 125 mod 23 = 10
∴ 53(mod 23) = 5XB (mod23)
= XB = 3
∴ Bob‘s private key XB = 3
1. If Alice has a public key YA = 8 , what is the shared key K with Bob.
Alice has a public key YA= 8
The shared key K with Bob = ?
K= YAXB(mod q)
23
AmanVerma
K = 83(mod23)
K= 512(mod23)
K= 6(mod 23)
∴ K=6 is the shared key with Bob.
In order to check whether 5 is a primitive root of 23 we need to construct a table for it
as shown below:
∴ 522 = 54 x 54 x 54 x 54 x 54 x 52
= (4x 4 x 4 x 4 x 4 x 2) (mod 23)
= 16 x 16 x 8 (256 x 8) (mod23)
= 24 (mod 23)
=1
Thus 5 is a primitive root of 23.
Q.What is public key cryptography?
Public key cryptography definition: Public key cryptography is a type of encryption technique
that employs two keys that are mathematically related but not identical – one private or secret
and one public.
24
AmanVerma
In layman’s terms, it is a method of cryptography that requires two separate keys. One private for
decrypting the data and one public for encrypting the data in order to protect it from unauthorized
access or use.
Public key cryptography example
An HR representative (Rashmi) from Naukri.com wishes to send Aquib an encrypted email.
Rashmi encrypts the message using Aquib’s public key, and when Aquib receives it, he uses his
private key to decrypt the message from Rashmi.
Although attackers may attempt to compromise the server in order to read the message, they will
be unable to do so because they lack the private key required to decrypt the message. Because he
is the only one with the private key, only Aquib will be able to decrypt the message. Aquib
simply repeats the process when he wishes to respond, encrypting her message with Rasmi’s
public key.
25
AmanVerma
Applications of public key cryptography
There are various public key cryptography applications, and some of the most common ones are
digital signatures and encryption.
Digital signatures: A digital signature confirms the signer’s identity and ensures that the
documents transmitted are not forged or tampered with. Digital signatures function similarly to
electronic ―fingerprints.‖ Some of the benefits of using digital signatures are:

Speed: First and foremost, signing documents digitally is not the same as signing them on
paper in terms of time management and ease of use. The administrative burden can hamper the
sale and, in some cases, force it to be terminated. Using electronic signatures in your business
could save you money.

User Experience: Improving the user experience is a second overlooked benefit. Opening a
signing email request simplifies printing, signing, and scanning a document to return it.

Security: Identification and authentication checks provide a high level of protection for
document access and signing capabilities.

Fewer errors: By automating the digital signature process, the financial consequences of
human errors, such as signing errors or document loss, can be reduced.
For more information, you can also explore: What is a digital signature?
Encryption: Encryption is a method of concealing information by transforming it into what
appears to be random data. Some of the benefits of using encryption are:

Confidentiality: Because the content is encrypted using the sender’s public key, it can only be
decrypted using the recipient’s private key, ensuring that only the receiving party can decrypt
the content.
26
AmanVerma

Integrity: Even the slightest change to the original content will cause the decryption process to
fail, ensuring the content’s integrity.
Advantages of using public key cryptography
There are various advantages of this type of cryptography, and some of those advantages are:

Authentication: Because public key cryptography allows for digital signatures, message
recipients can confirm that messages are truly coming from a specific sender.

Convenience: This type of cryptography addresses the issue of distributing encryption keys by
having everyone publish their public keys while keeping private keys private.

Non-repudiation: Digitally signed messages function similarly to physically signed
documents. It is essentially the same as admitting a message; thus, the sender cannot deny it.

Tampering detection: Message recipients can detect tampering using digital signatures in
public key encryption.
Disadvantages of using public key cryptography
As almost everything has its advantages and disadvantages, public key cryptography also has
some disadvantages of its own, such as:

Security: If an attacker discovers your private key, he or she can read all of your messages.

Possibility of losing a private key: If your private key is lost, you will not be able to decrypt
the received messages.

Slow working: Because this method is slower than symmetric cryptography, it is unsuitable
for decrypting bulk messages.

Public keys are not authenticated: No one knows for certain that a public key belongs to the
individual it specifies, so users must verify that their public keys truly belong to them.
27
AmanVerma
verma
2022-12-24 00:07:10
-------------------------------------------video save kiya hai outube me or pahle ka 14
haianswer galat diya hai
Q.list for general characteristics of Schema for
the distribution of public key
In cryptography, it is a very tedious task to distribute the public and private
keys between sender and receiver. If the key is known to the third party
(forger/eavesdropper) then the whole security mechanism becomes
worthless. So, there comes the need to secure the exchange of keys.
There are two aspects for Key Management:
1. Distribution of public keys.
2. Use of public-key encryption to distribute secrets.
Distribution of Public Key:
The public key can be distributed in four ways:
1. Public announcement
2. Publicly available directory
3. Public-key authority
4. Public-key certificates.
These are explained as following below:
1. Public Announcement: Here the public key is broadcasted to everyone.
The major weakness of this method is a forgery. Anyone can create a key
claiming to be someone else and broadcast it. Until forgery is discovered can
masquerade as claimed user.
28
AmanVerma
2. Publicly Available Directory: In this type, the public key is stored in a
public directory. Directories are trusted here, with properties like Participant
Registration, access and allow to modify values at any time, contains entries
like {name, public-key}. Directories can be accessed electronically still
vulnerable to forgery or tampering.
3. Public Key Authority: It is similar to the directory but, improves security
by tightening control over the distribution of keys from the directory. It
requires users to know the public key for the directory. Whenever the keys
are needed, real-time access to the directory is made by the user to obtain
any desired public key securely.
4. Public Certification: This time authority provides a certificate (which
binds an identity to the public key) to allow key exchange without real-time
access to the public authority each time. The certificate is accompanied by
some other info such as period of validity, rights of use, etc. All of this
content is signed by the private key of the certificate authority and it can be
verified by anyone possessing the authority‘s public key.
First sender and receiver both request CA for a certificate which contains a
public key and other information and then they can exchange these
certificates and can start communication.
Q.describe the roles of the different servers in kerberos protocol
how does the user get authenticated to the different servers
Kerberos provides a centralized authentication server whose function
is to authenticate users to servers and servers to users. In Kerberos
Authentication server and database is used for client authentication.
Kerberos runs as a third-party trusted server known as the Key Distribution
Center (KDC). Each user and service on the network is a principal.
29
AmanVerma
The main components of Kerberos are:

Authentication Server (AS):
The Authentication Server performs the initial authentication and ticket for
Ticket Granting Service.

Database:
The Authentication Server verifies the access rights of users in the
database.

Ticket Granting Server (TGS):
The Ticket Granting Server issues the ticket for the Server
Kerberos Overview:

Step-1:
User login and request services on the host. Thus user requests for ticketgranting service.

Step-2:
Authentication Server verifies user‘s access right using database and
then gives ticket-granting-ticket and session key. Results are encrypted
using the Password of the user.

Step-3:
The decryption of the message is done using the password then send the
ticket to Ticket Granting Server. The Ticket contains authenticators like
user names and network addresses.
30
AmanVerma

Step-4:
Ticket Granting Server decrypts the ticket sent by User and authenticator
verifies the request then creates the ticket for requesting services from
the Server.

Step-5:
The user sends the Ticket and Authenticator to the Server.

Step-6:
The server verifies the Ticket and authenticators then generate access to
the service. After this User can access the services.
Kerberos Limitations








Each network service must be modified individually for use with Kerberos
It doesn‘t work well in a timeshare environment
Secured Kerberos Server
Requires an always-on Kerberos server
Stores all passwords are encrypted with a single key
Assumes workstations are secure
May result in cascading loss of trust.
Scalability
Data is prone to various attacks. One of these attacks includes message
authentication. This threat arises when the user does not have any
information about the originator of the message. Message authentication can
be achieved using cryptographic methods which further make use of keys.
Authentication Requirements:





Revelation: It means releasing the content of the message to someone
who does not have an appropriate cryptographic key.
Analysis of Traffic: Determination of the pattern of traffic through the
duration of connection and frequency of connections between different
parties.
Deception: Adding out of context messages from a fraudulent source into
a communication network. This will lead to mistrust between the parties
communicating and may also cause loss of critical data.
Modification in the Content: Changing the content of a message. This
includes inserting new information or deleting/changing the existing one.
Modification in the sequence: Changing the order of messages
between parties. This includes insertion, deletion, and reordering of
messages.
31
AmanVerma



Modification in the Timings: This includes replay and delay of
messages sent between different parties. This way session tracking is
also disrupted.
Source Refusal: When the source denies being the originator of a
message.
Destination refusal: When the receiver of the message denies the
reception.
Q.give the classification of authentication
function in detail
Message Authentication Functions:
All message authentication and digital signature mechanisms are based on
two functionality levels:
Lower level: At this level, there is a need for a function that produces an
authenticator, which is the value that will further help in the authentication
of a message.
 Higher-level: The lower level function is used here in order to help
receivers verify the authenticity of messages.
These message authentication functions are divided into three classes:



Message encryption: While sending data over the internet, there is
always a risk of a Man in the middle(MITM) attack. A possible solution for
this is to use message encryption. In message encryption, the data is first
converted to a ciphertext and then sent any further. Message encryption
can be done in two ways:
Symmetric Encryption: Say we have to send the message M from a
source P to destination Q. This message M can be encrypted using a
secret key K that both P and Q share. Without this key K, no other person
can get the plain text from the ciphertext. This maintains confidentiality.
Further, Q can be sure that P has sent the message. This is because
other than Q, P is the only party who possesses the key K and thus the
ciphertext can be decrypted only by Q and no one else. This maintains
authenticity. At a very basic level, symmetric encryption looks like this:
32
AmanVerma



Public key Encryption: Public key encryption is not as advanced as
symmetric encryption as it provides confidentiality but not authentication.
To provide both authentication and confidentiality, the private key is
used.
Message authentication code (MAC): A message authentication code is
a security code that the user of a computer has to type in order to access
any account or portal. These codes are recognized by the system so that
it can grant access to the right user. These codes help in maintaining
information integrity. It also confirms the authenticity of the message.
Hash function: A hash function is nothing but a mathematical function
that can convert a numeric value into another numeric value that is
compressed. The input to this hash function can be of any length but the
output is always of fixed length. The values that a hash function returns
are called the message digest or hash values.
Measures to deal with these attacks:
Each of the above attacks has to be dealt with differently.

Message Confidentiality: To prevent the messages from being revealed,
care must be taken during the transmission of messages. For this, the
message should be encrypted before it is sent over the network.
33
AmanVerma



Message Authentication: To deal with the analysis of traffic and
deception issues, message authentication is helpful. Here, the receiver
can be sure of the real sender and his identity. To do this, these methods
can be incorporated:
 Parties should share secret codes that can be used at the time
of identity authentication.
 Digital signatures are helpful in the authentication.
 A third party can be relied upon for verifying the authenticity of
parties.
Digital Signatures: Digital signatures provide help against a majority of
these issues. With the help of digital signatures, content, sequence, and
timing of the messages can be easily monitored. Moreover, it also
prevents denial of message transmission by the source.
Combination of protocols with Digital Signatures: This is needed to
deal with the denial of messages received. Here, the use of digital
signature is not sufficient and it additionally needs protocols to support its
monitoring.
Q.What Does Smurfing Mean?
In an IT context, smurfing is a type of denial-of-service attack that relies
on flooding a network with a large volume of traffic through the
manipulation of IP addresses in that network. This type of attack can
result in a high volume of excess activity, which can overwhelm a server
or IT setup.
A Smurf attack is a distributed denial-of-service (DDoS) attack in which an attacker
floods a victim’s server with spoofed Internet Protocol (IP) and Internet Control
Message Protocol (ICMP) packets. As a result, the target’s system is rendered
34
AmanVerma
inoperable. This type of attack gets its name from a DDoS.Smurf malware tool that
was widely used in the 1990s. The small ICMP packet generated by the malware
tool can cause significant damage to a victim’s system, hence the name Smurf.
How Does a Smurf Attack Work?
Smurf attacks are similar to a form of denial-of-service (DoS) attacks called ping
floods, since they’re accomplished by flooding a victim’s computer with ICMP Echo
Requests. The steps in a Smurf attack are as follows:
1. Attacker locates the target’s IP address: An attacker identifies the target victim’s
IP address.
2. Attacker creates spoofed data packet: Smurf malware is used to create a spoofed
data packet, or ICMP Echo Request, that has its source address set to the real IP
address of the victim.
3. Attacker sends ICMP Echo Requests: The attacker deploys ICMP Echo Requests
to the victim’s network, causing all connected devices within the network to respond
to the ping via ICMP Echo Reply packets.
4. Victim is flooded with ICMP replies: The victim then receives a flood of ICMP Echo
Reply packets, resulting in a denial-of-service to legitimate traffic.
5. Victim’s server becomes overloaded: With enough ICMP Reply packets
forwarded, the victim’s server is overloaded and potentially rendered inoperable.
6. A SYN flood, also known as a TCP SYN flood, is a type of denial-ofservice (DoS) or distributed denial-of-service (DDoS) attack that sends
massive numbers of SYN requests to a server to overwhelm it with open
connections.
Q.What Is a SYN Flood?
A SYN flood, sometimes known as a half-open attack, is a network-tier attack that
bombards a server with connection requests without responding to the
corresponding acknowledgements. The large numbers of open TCP connections that
result consume the server’s resources to essentially crowd out legitimate traffic,
making it impossible to open new legitimate connections and difficult or impossible
for the server to function correctly for authorized users who are already connected.
Q.What Is a Ping of Death Attack?
The ping of death is a form of denial-of-service (DoS) attack that occurs when an attacker
crashes, destabilizes, or freezes computers or services by targeting them with oversized data
packets. This form of DoS attack typically targets and exploits legacy weaknesses that
organizations may have patched.
Unpatched systems are also at risk from ping floods, which target systems by overloading them
with Internet Control Message Protocol (ICMP) ping messages.
35
AmanVerma
Q.What Is Trojan Horse?
A Trojan horse (or simply known as Trojan) is defined as a software
package containing malicious code that appears to be legitimate,
similar to the ancient Greek myth of the Odyssey that caused severe
damage to Troy despite having a harmless exterior.
Trojans are malicious code or software that infiltrate a computer while
impersonating a genuine program and eventually take over the system
without the user or IT administrator noticing. Technically, Trojans are not
viruses – instead, they are a sort of malware. Although this is incorrect, the
terms Trojan malware and Trojan virus are frequently used
interchangeably. Viruses can execute and replicate themselves. A Trojan,
however, cannot and must be executed by the user.
How to identify a Trojan horse
Since Trojan horses frequently appear disguised as legitimate system files,
they are often very hard to find and destroy with conventional virus and
malware scanners. Specialized software tools are often necessary for the
identification and removal of discrete Trojan horses.
However, it's possible to identify the presence a Trojan horse through
unusual behaviors displayed by a computer. The quirks could include:

A change in the computer's screen, including changing color
andresolution or an unnecessary flip upside down.

Excessive amounts of pop-up ads appear, offering solutions to various
errors which might prompt the end user to click on the ad.

The computer mouse may start moving by itself or freezing up
completely and the functions of the mouse buttons may reverse.

The browser's homepage may change or the browser will consistently
redirect the user to a different website than the one they are requesting.
This redirected website will often contain an offer that users can click on
or download which will, in turn, install more malware.
36
AmanVerma

The computer's antivirus and antimalware programs will be disabled and
the necessary steps to remove malware will be inaccessible.

Mysterious messages and abnormal graphic displays may start
appearing.

Unrecognized programs will be running in the task manager.

The taskbar will either change in appearance or completely disappear.

The computer's desktop wallpaper may change as well as the format of
desktop icons and applications.

The user's personal email service may start sending spam messages to
all or some of the addresses in the contact list that frequently contain
malware and a persuasive tactic to get recipients to open and download
the attack, thus spreading the Trojan horse to other computers.
How to Protect yourself from Trojans?
A mix of good network safety practices and utilizing a Trojan scanner regularly are demonstrated
approaches to ensure against Trojan assaults. Observe these means to shield yourself and your framework
from being attacked.
1. Do not download from untrusted sources: Never download or introduce any product program from
a site or source that you don't completely trust.
2. Avoid phishing assaults: Do not open a connection or snap a connection in an email that was
simply shipped off you from an arbitrary individual.
3. Update your Operating framework and any introduced security conventions: Regularly update
your OS to ensure that the product is progressively equipped for battling off dangers. Updates
normally incorporate security patches on the most recent dangers.
4. Do not visit dangerous sites: Be watching out for any sites that don't have security testaments –
their URL ought to incorporate https://rather than HTTP://. The 's' represents secure and there
ought to likewise be a lock close to the URL in the location bar.
5. Do not click spring up or flag from the web: Do not click any new, untrusted popups because they
might contain incredible Trojan ponies.
6. Protect records with perplexing, interesting passwords. A solid secret key isn't difficult to figure
and is undeniably comprised of a blend of upper-and lower-case letters, extraordinary characters,
and numbers. Try not to utilize a similar secret word in all cases and change your secret key
consistently. A secret phrase administrator apparatus is a magnificent method to deal with your
passwords.
37
AmanVerma
7. Keep your data protected with firewalls. Firewalls screen information that enters your gadget from
the web. While most working frameworks accompany an inherent firewall, it's additionally a
smart thought to utilize an equipment firewall for complete security.
8. Back up consistently. While backing up your documents will not shield you from downloading a
Trojan, it will help you ought to a malware assault cause you to lose anything significant.
Q.A virus
is a fragment of code embedded in a legitimate program.
Viruses are self-replicating and are designed to infect other programs. They
can wreak havoc in a system by modifying or destroying files causing system
crashes and program malfunctions. On reaching the target machine a virus
dropper(usually a trojan horse) inserts the virus into the system.
For more details, refer to this.
Various types of viruses :

File Virus:
This type of virus infects the system by appending itself to the end of a
file. It changes the start of a program so that the control jumps to its code.
After the execution of its code, the control returns back to the main
program. Its execution is not even noticed. It is also called a Parasitic
virus because it leaves no file intact but also leaves the host functional.

Boot sector Virus:
It infects the boot sector of the system, executing every time system is
booted and before the operating system is loaded. It infects other
bootable media like floppy disks. These are also known as memory
viruses as they do not infect the file systems.
38
AmanVerma

Macro Virus:
Unlike most viruses which are written in a low-level language(like C or
assembly language), these are written in a
high-level language like
Visual Basic. These viruses are triggered when a program capable of
executing a macro is run. For example, the macro viruses can be
contained in spreadsheet files.

Source code Virus:
It looks for source code and modifies it to include virus and to help spread
it.

Polymorphic Virus:
A virus signature is a pattern that can identify a virus(a series of bytes
that make up virus code). So in order to avoid detection by antivirus a
polymorphic virus changes each time it is installed. The functionality of
the virus remains the same but its signature is changed.

Encrypted Virus:
In order to avoid detection by antivirus, this type of virus exists in
encrypted form. It carries a decryption algorithm along with it. So the virus
first decrypts and then executes.

Stealth Virus:
It is a very tricky virus as it changes the code that can be used to detect it.
Hence, the detection of viruses becomes very difficult. For example, it can
39
AmanVerma
40
Download