ISS Assignment 2 Completed Full
ISS Assignment 2 Completed Full
Security (6CS4-03)
Sri Balaji College of Engineering and Technology, Jaipur
Department of Computer Science and Engineering / AI
A public key cryptosystem uses two keys: a public key (used for encryption) and a private
key (used for decryption). It ensures secure communication without sharing secret keys.
A digital signature is a cryptographic technique that verifies the authenticity and integrity of
a message, software, or digital document using public key cryptography.
3. 3. What is encryption?
A hash function takes an input and returns a fixed-size string, usually a hash code, which
represents the original data. It's used in password storage, digital signatures, etc.
RSA security is based on the difficulty of factoring large prime numbers. The larger the key
size (e.g., 2048-bit), the more secure the RSA encryption.
Symmetric:
- Uses one key
- Fast
- Used for bulk data
- Less secure
Asymmetric:
- Uses two keys
- Slower
- Used for key exchange
- More secure
Key management involves the generation, distribution, storage, rotation, and revocation of
cryptographic keys in a secure way.
A brute-force attack tries all possible combinations of keys until the correct one is found. It’s
time-consuming but guaranteed to succeed eventually.
An authentication protocol is a sequence of steps that verify the identity of a user or device,
ensuring only legitimate entities communicate.
- Authenticity
- Integrity
- Non-repudiation
It refers to the secure sharing of secret keys between parties, which is essential in
symmetric encryption systems.
A method involving three steps of mutual authentication between two parties to ensure
both identities are verified securely.
Factorization breaks a large number into its prime factors. It is used in breaking RSA
encryption since its security relies on the difficulty of this process.
X.509 is a standard that defines digital certificates, which verify the identity of
users/devices using a Certificate Authority (CA).
Introduced in 1976 by Diffie and Hellman, it solved key exchange problem. RSA was
proposed later in 1977. It allowed secure communication without sharing a secret key.
26. 26. What are the Requirements for a Hash Function? Explain.
- Closure: (a + b) mod n ∈ Zn
- Associativity
- Distributivity
- Existence of inverse under multiplication (if a, n are coprime)
MD5:
- 128-bit hash
- Faster
- Less secure
SHA-1:
- 160-bit hash
- Slower
- More secure but now deprecated
36. 36. What is the Role of RSA Algorithm in Public Key Encryption and Application of
Public Cryptography?
RSA allows secure key exchange, digital signatures, and data encryption. It’s widely used in
SSL/TLS, email security, and banking systems.
In one-way authentication, only one party proves its identity. Example: When a client
verifies the identity of a server (e.g., via SSL certificate) but not vice-versa.
S-BOX (Substitution box) is used in block ciphers like AES for confusion.
- It substitutes input bits with different output bits using a fixed table
- Example: Input = 0110, S-BOX[0110] = 1010
- Adds non-linearity to encryption, making it secure against attacks