NS Two Marks
NS Two Marks
TECHNOLOGY
1. What is cryptology?
Cryptology is the study of cryptography and cryptanalysis.
9. How many keys are required for two people to communicate via a cipher?
If both sender and receiver use the same key, the system is referred to as symmetric,
single key, secret key, or conventional encryption. If the sender and receiver each use a different
key, the system is referred to as asymmetric, two-key, or public-key encryption.
10. What is the difference between a block cipher and a stream cipher?
A block cipher processes the input one block of elements at a time, producing an output
block for each input block.
A stream cipher processes the input elements continuously, producing outp ut one
element at a time, as it goes along.
16. Which parameters and design choices determine the actual algorithm of a feistel
cipher?
Block size
Key size
Number of rounds
Sub key generation algorithm
Round functions
Fast software encryption or decryption
Ease of analysis
19. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher?
Mono alphabetic cipher: Here a single cipher alphabet is used.
Poly alphabetic cipher: Here a set of r elated mono alphabetic substitution rules is used.
UNIT II
6. What was the original set of criteria used by NIST to evaluate candidate AES cipher?
The original set of criteria used by NIST to evaluate candidate AES cipher was:
Security, Memory Requirements, Actual Security, Algorithm And Implementation,
Randomness, Soundness, Flexibility, Hardware and software suitability, Cost, Simplicity,
Licensing Requirements, Computational Efficiency
7. What was the final set of criteria used by NIST to evaluate candidate AES ciphers?
The final set of criteria used by NIST to evaluate candidate AES ciphers was:
General Security
Software Implementations
Restricted-Space Environments
Hardware Implementations
Attacks On Implementations
Encryption vs. Decryption
Key Agility
Other Versatility And Flexibility
Potential for Instruction-Level Parallelism
8. What is power analysis?
Power analysis is the power consumed by the smart card at an y particular time during the
cryptographic operation is related to the instruction being executed and to the data being
processed.
Eg) Multiplication consumes more power than addition and writing 1s consumes ore power than
writing 0s.
14. What is the difference between Sub Bytes and Sub Word?
Sub Bytes: Sub Bytes uses an S-box to perform a byte-by-byte substitution of the block. Sub
Word: Sub Word performs a byte substitution on each byte of its input word, using the S box.
15. What is the difference between Shift Rows and Rot Word?
Shift Rows: Shift Row is simple permutation. It shifts the rows circularly left or right.
Rot Word: Rot word performs a one-byte circular left shift on a word. This means that an input
word [b0,b1,b2,b3] is transformed into [b1,b2,b3,b0].
20. Why do some block cipher modes of operation only use encryption while others use
both encryption and decryption?
Some block cipher modes of operation only use encryption because the input is set to
some initialization vector and the leftmost bits of the output of the encryption function are XOR
with the first segment of plain text p1 to produce the first unit of cipher text C1 and it is
transmitted. While in decryption, the cipher text is XOR with the output of the encryption
function to produce the plain text.
UNIT III
7. For a user workstations in a typical business environment, list potential locations for
confidentiality attacks.
LANs in the same building that are interconnected with bridges and routers.
Twisted pair and coaxial cable can be attacked using either invasive taps or inductive
devices that monitor electromagnetic emanation.
In addition to the potential vulnerability of the various communications links, the various
processors along the path are themselves subject to attack.
8. What is the difference between link and end-to-end encryption?
11. List ways in which secret keys can be distributed to two communicating parties.
A can select a key and physically deliver it to B.
A third party can select the key and physically deliver it o A and B
If A and B have previously and recently used a key, one party can transmit the new key
to the other, encrypted using the old key
If A and B each has an encrypted connection to a third party C, C can deliver a
key on the encrypted links to A and B
12. What is nonce?
Consider A issues a request to the KDC for a session key to protect a logical connection
to B. The message includes the identity of A and B and a unique identifier, N1 , for this
transaction, which we refer to as nonce. The nonce may be a timestamp, a counter, or a random
number.
16. Why is the middle portion of 3DES a decryption rather than an encryption?
Decryption requires that the keys be applied in reverse order: P=Dk1 [Ek1 [P]]
This results in a dramatic increase in cryptographic strength. The use of DES results in a
mapping that is not equivalent to a single DES encryption.
17.What is the difference between the AES decryption algorithm and the equivalent
inverse cipher?
In AES decryption, we use inverse shift rows inverse sub bytes, add round key, inverse
mix columns. But in equivalent inverse cipher, we interchange inverse shift rows and inverse sub
bytes.
MAC is Message Authentication Code. It is a function of message and secret key which
produce a fixed length value called as MAC.
17.Assume the client C wants to communicate server S using Kerberos procedure. How can
it be achieved?
a) C AS: [IDC|| PC || IDV] b) AS C:
Ticket
c) C V: [IDC || ADC || IDV] Ticket = EKV [IDC ||ADC || IDV]
7. Define S/MIME?
Secure/Multipurpose Internet Mail Extension(S/MIME) is a security enhancement to the
MIME Internet E-mail format standard, based on technology from RSA Data Security.
17. What do you mean by Security Association? Specify the parameters that identifies the
Security Association?
An association is a one-way relationship between a sender and receiver that affords
security services to the traffic carried on.
A key concept that appears in both the authentication and confidentiality mechanism for
IP is the security association (SA).
A security Association is uniquely identified by 3 parameters:
Security Parameter Index (SPI).
IP Destination Address.
Security Protocol Identifier.
*************************************************************************************