Unit I
Unit I
a) What is cryptography?
Cryptography is the science of
securing information by converting it
into a secure format so unauthorized
users cannot access it.
b) What is Steganography?
Steganography is the technique of
hiding secret data within an ordinary,
non-secret file or message to avoid
detection.
UNIT-II
c) What is Group?
A group is a set with an operation that
satisfies closure, associativity, identity,
and inverse properties.
d) What is field?
A field is a set with two operations
(addition and multiplication) satisfying
group properties and distributivity.
UNIT-III
d) What types of
attacks are
addressed by
message
authentication?
• Forgery
• Replay attacks
• Message
modification
f) What is digital
signature?
A digital signature is a
cryptographic technique
to validate the
authenticity and integrity
of a message or
document.
⸻
UNIT-IV
d) What is PGP.
PGP (Pretty Good Privacy) is a data
encryption and decryption program for
secure communication.
g) Why email
compatibility function in
PGP needed?
To ensure that binary data
can be sent over text-
based email systems.
h) Define S/MIME.
S/MIME (Secure/
Multipurpose Internet
Mail Extensions) is a
standard for public key
encryption and signing of
MIME data.
j) Define Kerberos.
Kerberos is a network
authentication protocol
that uses secret-key
cryptography to
authenticate clients and
servers.
UNIT-V
j) Discuss Intrusion
Detection.
Intrusion Detection is the
process of monitoring
systems or networks for
signs of malicious activity
or policy violations.
Short question
UNIT-I
Diagram:
Security Services:
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
• Access Control
UNIT-II
⸻
h) Explain RSA Algorithm. Also
discuss the security of RSA
algorithm.
Steps:
1. Choose primes p,
q
2. Compute n = p ×
q, φ(n) = (p-1)(q-1)
3. Choose e such
that 1 < e < φ(n) and
gcd(e, φ(n)) = 1
4. Compute d ≡ e⁻¹
mod φ(n)
Encryption: C = M^e mod
n
Decryption: M = C^d mod
n
Security: Based on difficulty of
factoring large integers
UNIT-III
Example:
p=23, g=5, x=6 → y=8
Encrypt M=10 with k=7
C1 = 17, C2 = 13
M = C2 / C1^x mod p = 10
UNIT-IV
⸻
d) What is Diffie-Hellman Key
Exchange in key management?
Diffie-Hellman allows two parties to
securely share a secret key over an
insecure channel without prior key
exchange, using mathematical
computations based on discrete
logarithms.
UNIT-V
⸻
j) Explain Secure Electronic
Transaction (SET) protocol with their
components.
SET Components:
• Cardholder
• Merchant
• Payment Gateway
• Certificate
Authority
SET uses:
• Digital
Certificates
• Dual Signatures
• Public Key
Infrastructure (PKI)
to ensure secure credit
card transactions.
Long question
Unit 1
UNIT-I
g) Explanation of:
• Message
Integrity: Ensures data
has not been altered.
• Denial of Service
(DoS): Attack that
disrupts service
availability.
• Availability:
Ensures authorized users
have access to
information.
• Authentication:
Verifies the identity of
users or systems.
UNIT-II
Unit-III