0% found this document useful (0 votes)
10 views4 pages

Wa0019.

The document provides answers to the 2022–2023 Cryptography & Network Security question paper for MAKAUT B.Tech 8th Semester, covering various topics such as data leakage prevention, types of firewalls, cryptography definitions, and cyber attack types. It includes very short, short, and long answer questions, detailing concepts like SSL protocol steps, virus behavior, network security measures, and examples of cryptographic techniques. Additionally, it offers insights into biometrics and their challenges.

Uploaded by

Aparna Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

Wa0019.

The document provides answers to the 2022–2023 Cryptography & Network Security question paper for MAKAUT B.Tech 8th Semester, covering various topics such as data leakage prevention, types of firewalls, cryptography definitions, and cyber attack types. It includes very short, short, and long answer questions, detailing concepts like SSL protocol steps, virus behavior, network security measures, and examples of cryptographic techniques. Additionally, it offers insights into biometrics and their challenges.

Uploaded by

Aparna Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Here are the answers to the 2022–2023 Cryptography & Network Security question paper

(Paper Code: PEC-CS801B/PECIT8018), MAKAUT B.Tech 8th Semester:

Group A – Very Short Answer Type Questions (1x10 = 10 marks)

1.​ Measures to reduce risk of data leakage:​

○​ Use data encryption, access controls, DLP tools, and employee training.
2.​ Creates an isolated passage across a public network:​

○​ Virtual Private Network (VPN).


3.​ Types of firewall:​

○​ Packet-filtering firewall, Stateful inspection firewall, Proxy firewall,


Next-generation firewall.
4.​ Protocol responsible for sending Change Cipher Spec messages:​

○​ TLS (Transport Layer Security) or SSL.


5.​ Asymmetric encryption procedure:​

○​ Involves wrapping protected information using a public key for encryption and
private key for decryption.
6.​ AES algorithm uses number of keys:​

○​ One symmetric key (same for encryption and decryption).


7.​ SSL uses algorithm to ensure message integrity:​

○​ Message Digest algorithm like SHA (Secure Hash Algorithm).


8.​ DES mode used for operating on short data:​

○​ Electronic Code Book (ECB) mode.


9.​ Used to generate message digest:​

○​ Hash functions (e.g., MD5, SHA-1, SHA-256).


10.​In authentication, claimant proves secret without revealing it:​

●​ Zero-Knowledge Proof.
11.​Define Firewall:
●​ A security device or software that monitors and controls incoming/outgoing network
traffic based on predefined rules.
12.​A proxy gateway is:
●​ An application-level gateway that filters requests and responses between networks.
Group B – Short Answer Type Questions (5x3 = 15 marks)

Q2. Define cryptography. Briefly discuss Diffusion & Confusion.

●​ Cryptography is the science of securing data through encoding so that only intended
recipients can read it.
●​ Diffusion: Hides statistical structure of plaintext by spreading it over ciphertext (e.g., in
block ciphers).
●​ Confusion: Increases complexity of ciphertext by making the relationship between
ciphertext and key complex (e.g., S-boxes in DES).

Q3. Explain technical details of firewall and any one type with diagram.

●​ A firewall filters traffic between a trusted and untrusted network. It uses rules based on
IP addresses, ports, protocols, etc.
●​ Packet-filtering firewall:​
![Diagram omitted here – basic layout shows firewall between internet and LAN, filtering
packets based on rules.]

Q4. Explain different types of cyber attacks to break network security.

●​ Phishing, DoS/DDoS, Man-in-the-middle (MITM), Brute force, SQL Injection,


Malware attacks are some common types.
●​ Each aims to steal data, disrupt service, or gain unauthorized access.

Q5. Compare stream cipher and block cipher with example.

●​ Stream cipher: Encrypts data bit-by-bit (e.g., RC4).


●​ Block cipher: Encrypts fixed-size blocks (e.g., AES, DES).
●​ Block ciphers are more secure but slower; stream ciphers are faster for streaming data.

Q6. Define cryptanalysis. Explain security aspects in cryptography.

●​ Cryptanalysis is the process of breaking encryption without knowing the key.


●​ Security aspects include: Confidentiality, Integrity, Authentication, Non-repudiation.
Group C – Long Answer Type Questions (15x3 = 45 marks)

Q7. (a) Steps involved in SSL protocol:

1.​ Client Hello


2.​ Server Hello
3.​ Certificate exchange
4.​ Key exchange
5.​ Cipher specification
6.​ Finished message
7.​ Secure communication begins

(b) Advantages of SSL:

●​ Encryption, authentication, data integrity, and trust through digital certificates.

(c) Difference between SSL and TLS:

●​ TLS is the successor of SSL with stronger encryption and better security protocols.

Q8. (a) Viruses and their working:

●​ Examples: ILOVEYOU, Melissa, Trojan Horse.


●​ Working: Self-replicate, infect files or systems, cause damage or data theft.

(b) Types of attacks:

●​ Passive attacks: Eavesdropping, traffic analysis.


●​ Active attacks: Spoofing, DoS, session hijacking.

Q9. (a) Network security:

●​ Measures to protect data during transmission over networks from unauthorized access.

(b) Security mechanisms:

●​ Encryption, firewalls, intrusion detection systems, anti-virus, authentication.

(c) Steganography:

●​ Hiding secret data inside images, audio, or other files without altering their appearance.

(d) Zombie:
●​ A compromised system controlled by a hacker, often part of a botnet used in DDoS
attacks.

Q10. (a) Playfair Cipher Example:

●​ Uses 5x5 grid of letters. Encrypts digraphs.​


Example: Encrypt “HELLO” with key “MONARCHY”​
Result: HE → BM, LL → KD, OX → ZU (dummy letter added if repeated)

(b) Vernam Cipher:

●​ One-time pad cipher using XOR with a random key equal to message length.
●​ Perfectly secure if key is truly random, used once, and kept secret.

Q11. (a) Biometrics:

●​ Biological measurements used for identification (e.g., fingerprints, iris scans).

(b) Examples of Biometrics:

●​ Face recognition, voice recognition, fingerprint, retinal scan.

(c) Problems with current systems:

●​ False positives/negatives, privacy concerns, cost, potential for spoofing.

Let me know if you'd like:

●​ PDF or DOC version,


●​ Diagrams included,
●​ Or answers formatted for 15-mark preparation.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy