INS - Assignment 3 (TCS2223033)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Kavinesh Karuppaiah

Roll-No: TCS2223033

INS Assignment 3:

Q.1) Discuss the techniques for distributing public keys.


Ans)
The public key can be distributed in four ways:
 Public announcement
 Publicly available directory
 Public-key authority
 Public-key certificates. 

1. Public Announcement: 
Here the public key is broadcasted to everyone. The major
weakness of this method is a forgery. Anyone can create a key
claiming to be someone else and broadcast it. Until forgery is
discovered can masquerade as claimed user.

2. Publicly Available Directory: 


In this type, the public key is stored in a public directory.
Directories are trusted here, with properties like Participant
Registration, access and allow to modify values at any time,
contains entries like {name, public-key}. Directories can be
accessed electronically still vulnerable to forgery or tampering. 
3. Public Key Authority: 
It is similar to the directory but, improves security by tightening
control over the distribution of keys from the directory. It
requires users to know the public key for the directory.
Whenever the keys are needed, real-time access to the
directory is made by the user to obtain any desired public key
securely. 

4. Public Certification: 
This time authority provides a certificate (which binds an
identity to the public key) to allow key exchange without real-
time access to the public authority each time. The certificate is
accompanied by some other info such as period of validity,
rights of use, etc. All of this content is signed by the private key
of the certificate authority and it can be verified by anyone
possessing the authority’s public key. 
First sender and receiver both request CA for a certificate which
contains a public key and other information and then they can
exchange these certificates and can start communication.

Q.2) What are the requirements of digital signature?


Ans)
A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software, or digital
document. 
 
1. Key Generation Algorithms:
Digital signature is electronic signatures, which assure that the
message was sent by a particular sender. While performing digital
transactions authenticity and integrity should be assured,
otherwise, the data can be altered or someone can also act as if he
was the sender and expect a reply.

2. Signing Algorithms:
To create a digital signature, signing algorithms like email
programs create a one-way hash of the electronic data which is to
be signed. The signing algorithm then encrypts the hash value
using the private key (signature key). This encrypted hash along
with other information like the hashing algorithm is the digital
signature. This digital signature is appended with the data and
sent to the verifier. The reason for encrypting the hash instead of
the entire message or document is that a hash function converts
any arbitrary input into a much shorter fixed-length value. This
saves time as now instead of signing a long message a shorter
hash value has to be signed and moreover hashing is much faster
than signing.

3. Signature Verification Algorithms:


Verifier receives Digital Signature along with the data. It then uses
Verification algorithm to process on the digital signature and the
public key (verification key) and generates some value. It also
applies the same hash function on the received data and
generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then
the digital signature is valid else it is invalid.

Q.3) What is dispute resolution in Message authentication? Explain


any two properties of message authentication code (MAC).
Ans)
Message authentication is concerned with: protecting the integrity of
a message, validating identity of originator and non-repudiation of
origin (dispute resolution).
A message authentication code (MAC) is a cryptographic checksum on
data that uses a session key to detect both accidental and intentional
modifications of the data.
MAC algorithm is a symmetric key cryptographic technique to provide
message authentication. For establishing MAC process, the sender
and receiver share a symmetric key K.
Essentially, a MAC is an encrypted checksum generated on the
underlying message that is sent along with a message to ensure
message authentication.

Q.4) Explain the services offered by IPSec.


Ans)
The IP security (IPSec) is an Internet Engineering Task Force (IETF)
standard suite of protocols between 2 communication points across
the IP network that provide data authentication, integrity, and
confidentiality. It also defines the encrypted, decrypted and
authenticated packets. The protocols needed for secure key
exchange and key management are defined in it.

Uses of IP Security –
IPsec can be used to do the following things:
 To encrypt application layer data.
 To provide security for routers sending routing data across the
public internet.
 To provide authentication without encryption, like to authenticate
that the data originates from a known sender.
 To protect network data by setting up circuits using IPsec
tunneling in which all data is being sent between the two
endpoints is encrypted, as with a Virtual Private Network (VPN)
connection.

Q.5) Write short note on stateful packet filter firewall


Ans)
As the name suggests, a stateful firewall always keeps track of the
state of network connections. Once a particular kind of traffic has
been approved by a stateful firewall, it is added to a state table. The
state table entries are created for TCP (Transmission Control Protocol)
streams or UDP (User Datagram Protocol) datagrams that are allowed
to communicate through the firewall in accordance with the
configured security policy. If no traffic is seen for a specified time
(implementation dependent), the connection is removed from the
state table.
It uses the concept of a state table where it stores the state of
legitimate connections. Stateful firewall filter inspects everything
inside data packets, the characteristics of the data, and its channels of
communication.
Stateful firewalls filter packets based on the full context of the
connection. Stateful firewalls are more secure. They are expensive as
compared to stateless firewall.
Stateful firewalls are highly skilled to detect forged messaging or
unauthorized access. These firewalls have a powerful memory to
retain key aspects of network connections. These firewalls do not
need many ports open for proper communication.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy