Vous êtes sur la page 1sur 3

Get fully solved assignment.

Buy online from website


www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall
2011
SEMESTER
4
SUBJECT
MIT4022- Cryptography and Network SecurityCODE & NAME

Qus:1 Explain the different types of active security attacks.


Answer: Types of Threats (Attacks)
Interception:
This type of threat occurs when an unauthorized party(outsider) has gained access. The
outside party can be a person, a program, or a computing system. Examples of this type of
failure are illicit copying of program or data files, or wiretapping to obtain data in a network.
Although a loss may be discovered fairly quickly, a silent interceptor may leave no traces by
which the interception

Qus:2 Define cryptography. Describe the different dimensions used to characterize the
cryptographic systems.
Answer: Cryptography secret writing is the strongest tool for controlling against many
kinds of security threats. Well-disguised data cannot be read, modified, or fabricated easily.
Cryptography is rooted in higher mathematics: group and field theory, computational
complexity,

Qus:3 Define the followings:


a) Asymmetric key
b) Public key certificate
c) Public key cryptographic algorithm
d) Public key infrastructure
Write the two main uses for public-key cryptography.
Answer: a) Asymmetric key
asymmetric keys come in pairs, one half of the pair can be exposed without compromising
the other half. To see how, suppose S and R (our well-known sender and receiver) want to
derive a shared symmetric key. Suppose also that S and R both have public keys for a
common encryption algorithm; call these kPRIV-S, kPUB-S, kPRIV-R, and kPUB-R, for the
private

Qus:4 Describe the following schemes for the distribution of public key:
a) Public announcement
b) Publicly available directory
Answer: a) Public announcement The cryptanalyst may be lucky enough to have some
pairs of plaintext and matching ciphertext. Then, the game is to deduce the key by which
those pairs were encrypted so that the same key can be used in cases in which the analyst has
only the ciphertext. Although it might seem uncommon to be able to obtain matching plain-
and

Qus:5 Define the following malicious software:


a) Backdoor
b) Logic Bomb
c) Trojan Horses
d) Mobile Code
e) Multiple-Threat Malware
Answer: a) Backdoor
A trapdoor or backdoor is a feature in a program by which someone can access the program
other than by the obvious, direct call, perhaps with special privileges. For instance, an
automated bank teller program might allow anyone entering the number 990099 on the
keypad to process the log of everyone's transactions at that machine. In this example, the
trapdoor could be intentional, for maintenance purposes, or it could be an illicit way for the
implementer

Qus:6 Explain the following firewalls:


(a) Stateful Inspection firewalls
(b) Application level gateway
Answer: (a) Stateful Inspection firewalls
Filtering firewalls work on packets one at a time, accepting or rejecting each packet and
moving on to the next. They have no concept of "state" or "context" from one packet to the
next. A stateful inspection firewall maintains state information from one packet to another in
the input stream.
One classic approach used by attackers is breaking an attack into multiple packets by forcing
some

Get fully solved assignment. Buy online from website


www.smuassignment.in
online store
or
plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

Vous aimerez peut-être aussi