305A Cryptography and Network Seurity
305A Cryptography and Network Seurity
305A Cryptography and Network Seurity
UNIT I
Cryptography – Terminology, Conventional Encryption Model, Steganography, Classical Encryption Techniques, DES Data
Encryption Standard, Block Cipher Design principles and Modes of Operation.
UNIT II
Conventional Encryption Algorithms: Triples DES, International Data Encryption Algorithm, Blowfish, RC5, Characteristics of
advanced symmetric Block Ciphers, Confidentiality using Conventional Encryption.
UNIT III:
Public-Key Cryptography, Introduction to Number Theory: Prime Numbers, Modular Arithmetic, Euler’s Theorem,
Primary and Factorization, discrete logarithm, D-H Key sharing technique, RSA and its variants-Homomorphic Encryption
Techniques Message Authentication and Hash Functions – Hash and MAC algorithms..
UNIT IV
Digital, Signatures and authentication Protocols, Digital Signature Standard, Network Security Practice, Authentication
Applications. Basic overview of Electronic Mail Security: pretty Good Privacy’s/MIME: IP Security, Web Security – Intruders,
Viruses and Worms – Firewalls.
UNIT V
Mobile Security, Risk Model, Eco System, Service Risks, App Risks, Countermeasures- Cloud Computing Security- Threats-
Security in Cloud Security at service layers. Introduction to Block chain, Crypto currency, Bit Coin Security and working,
Ethereum.
Text Books
1. Cryptography and Network Security – by William Stallings, Principles and Practice, 7th
Edition, Pearson
2. Cryptography and Network Security, by John Wiley, Edn,.2001
Reference Books
1. Bruce Schneier, Applied Cryptography, John Wiley, Second Edn,2001.
2. Charke Kaufman, Rodia Perlman and Mike Speciner, Network Security
Cryptography is the process of converting ordinary plain text into unintelligible text and
vice-versa. It is a method of storing and transmitting data in a particular form so that only
those for whom it is intended can read and process it. Cryptography not only protects data
from theft or alteration, but can also be used for user authentication.
1. Symmetric-key cryptography
2. Hash functions.
3. Public-key cryptography
• Symmetric key cryptography :
It involves usage of one secret key along with encryption and decryption
algorithms which help in securing the contents of the message. The
strength of symmetric key cryptography depends upon the number of key
bits. It is relatively faster than asymmetric key cryptography. There arises
a key distribution problem as the key has to be transferred from the
sender to receiver through a secure channel..
Asymmetric key cryptography :
It is also known as public key cryptography because it involves
usage of a public key along with secret key. It solves the problem of
key distribution as both parties uses different keys for
encryption/decryption. It is not feasible to use for decrypting bulk
messages as it is very slow compared to symmetric key
cryptography.
Hashing –
3. Implementation attacks –
Implementation attacks such as side-channel analysis can be used to obtain a secret
key. They are relevant in cases where the attacker can obtain physical access to the
cryptosystem.
Convention Encryption Model
1. Plain text: This is the Original intelligible message or data that is fed in to the algorithm as input.
2. Encryption Algorithm: The encryption algorithm performs various substitutions and transformation on
the plain text to convert it into ciphertext.
3. Secret Key: The secret key is also input to the encryption algorithm. The key is a value independent
the
of plain text. The algorithm will produce a different output depending on the specific key being used at
the time. The exact substitutions and transformation s performed by the algorithm depend on the key.
4. Ciphertext: This is the scrambled m essage produced as output. It depends on the p ain l text and the
secret key. For a given message, two different keys will produce different ciphertexts. The ciphertext is
an apparently random stream of data and, as it stan ds, i s unintell gible.
i
5. Decryption Algorithm: This is essentially the encryption algorithm run in reverse. It takes the
ciphertext and the secret key as the input and produces the original plain text.
Steganography
• Steganography is a method of hiding secret data, by embedding it into an
audio, video, image, or text file. It is one of the methods employed to
protect secret or sensitive data from malicious attacks.
• One of the most popular techniques is 'least significant bit (LSB) steganography.
In this type of steganography, the information hider embeds the secret
information in the least significant bits of a media file.
• For instance, in an image file each pixel is comprised of three bytes of data
corresponding to the colors red, green, and blue (some image formats allocate an
additional fourth byte to transparency, or ‗alpha‘).
• LSB steganography changes the last bit of each of those bytes to hide one bit of
data. So, to hide one megabyte of data using this method, you‘ ll need an eigh t-
megabyte image file.
• Since modifying the last bit of the pixel value doesn‘t result in a visually
perceptible change to the picture, a person viewing the original and the
steganographically modified images won‘t be able to tell the difference.
Differences between steganography and cryptography
Encryption is of 2 types
1. Asymmetric Encryption – Same key for encryption and decryption
2. Symmetric Encryption –different keys for encryption and decryption
• There are 2 types of classical encryption techniques are there they are
1. Substitution Cipher
2. Transposition Cipher
Substitution Cipher :
It is an encryption technique where the letters in the plain text are substituted/replaced by
the letters or numbers or symbols
example:- plain text – ABCD
Cipher text – WXYZ
This substitution ciphers are divided into 5 types
1. Caser cipher
2. Mono alphabetic cipher
3. Poly alphabetic cipher
1. Vigner cipher
2. Vernam cipher
4. Play-fair cipher
5. Hill cipher
Transposition cipher:
The transposition cipher the characters or letters in the plain text are changed or
rearranged in the zig-zag way.
There is no replacement
There is no substitution
• Data encryption standard (DES) has been found vulnerable against very powerful
attacks and therefore, the popularity of DES has been found slightly on decline.
• DES is a block cipher, and encrypts data in blocks of size of 64 bit each, means 64 bits of
plain text goes as the input to DES, which produces 64 bits of cipher text.
• The same algorithm and key are used for encryption and decryption, with minor
differences. The key length is 56 bits.
• We have mention that DES uses a 56 bit key. Actually, the initial key consists of 64 bits.
• However, before the DES process even starts, every 8th bit of the key is discarded to
produce a 56 bit key.
• That is bit position 8, 16, 24, 32, 40, 48, 56 and 64 are discarded. The basic idea is show
in below figure.
Block Cipher Design Principles
• Block ciphers are built in the Feistel cipher structure. Block cipher has a
specific number of rounds and keys for generating ciphertext. For defining
the complexity level of an algorithm few design principles are to be
considered.
• These are explained as following below :
• Number of Rounds –
The number of Rounds is regularly considered in design criteria, it just
reflects the number of rounds to be suitable for an algorithm to make it
more complex.
• In DES (Data Encryption Standard) we have 16 rounds ensuring it to be
more secure while in AES (Advanced Encryption Standard) we have 10
rounds which makes it more secure.
1. Design of function F –
• The core part of the Feistel Block cipher structure is the Round Function.
• The complexity of cryptanalysis can be derived from the Round function i.e.
the increasing level of complexity for the round funct ion would be greatly
contributing to an increase in complexity.
• To increase the complexity of the round function, the avalanche effect is also
included in the round function, as the change of a single bit in plain text would
produce a mischievous output due to the presence of avalanche effect.
2. Key schedule algorithm –
• In Feistel Block ciphe r structure, each round would generate a sub-
key for increasing the complexity of cryptanalysis.
• The Avalanche effect makes it more complex in deriving sub-key.
Decryption must be done very carefully to get the actual output as
the avalanche effect is present in it
Modes of operation:
• Encryption algorithms are divided into two categories based on input type,
as block cipher and stream cipher.
• Block cipher is an encryption algorithm which takes fixed size of input
say b bits and produces a ciphertext of b bits again.
• If input is larger than b bits it can be divided further. For different
applications and uses,
• there are several modes of operations for a block cipher .
• Electronic Code Book (ECB)
• Cipher Block Chaining (CBC)
• Cipher Feedback Mode (CFB)
• Output Feedback Mode
1. Electronic Code Book (ECB)
• Electronic code book is the easiest block cipher mode of functioning. It is easier because
of direct encryption of each block of input plaintext and output is in form of blocks of
encrypted ciphertext. Generally, if a message is larger than b bits in size, it can be broken
down into bunch of blocks and the procedure is repeated.
3.Brief the strength of Data Encryption Algorithm and its modes of operations.
5.Write the differences between Block cipher design principles and modes of operarion.
SHORT ANSWER QUESTIONS
1.What is Cryptography?
3.Define Steganography?
4.What is DES?
• Bulk Encryption.
• Packet Encryption(ATM Packets)
• Password Hashing
Blowfish Encryption Algorithm
RC5:
• RC5 is a symmetric-key block cipher notable for its simplicity. Designed
by Ronald Rivest in 1994,
• RC stands for "Rivest Cipher", or alternatively, "Ron's Code" (compare
RC2 and RC4).
• The Advanced Encryption Standard (AES) candidate RC6 was based on
RC5.
• It is notable for being simple, fast (on account of using only primitive
computer operations like XOR, shift, etc.) and consumes less memory.
• RC5 is a block cipher and addresses two word blocks at a time.
• Depending on input plain text block size, number of rounds and
key size, various instances of RC5 can be defined and each
instance is denoted as RC5-w/r/b where w=word size in bits,
r=number of rounds and b=key size in bytes.
• In block cipher, they are typically used to observe the relation ship
between the key and the cipher text-Shannon’s property of confusion
• In general, S-Box takes m input bits and transforms them into n
output bits, where n is not necessarily equal to m.
• This is called m*n S-Box and is often implemented as a lookup table.
• Fixed tables are normally used asin the data encryption standard
(DES), but in some ciphers the tables are generated dynamically from
the key.
• One good example of a fixed table is the S-Box from DES, mapping 64-
bit input into 4-bit output.
Confidentiality Using Conventional Encryption:
• Conventional encryption is a cryptographic system that uses the
same key used by the sender to encrypt the message and by the
receiver to decrypt the message.
• It was the only type of encryption in use prior to the development of
public-key encryption.
• It is still much preferred of the two types of encryption systems due
to its simplicity.
• It is a relatively fast process since it uses a single key for both
encryption and decryption In this encryption model, the sender
encrypts plaintext using the receiver‘s secret key, which can be later
used by the receiver to decrypt the ciphertext. Below is a figure that
illustrates this concept.
Confidentiality using encryption algorithm
• Suppose A wants to send a message to B, that message is called
plaintext.
• Now, to avoid hackers reading plaintext, the plaintext is encrypted
using an algorithm and a secret key (at 1).
• This encrypted plaintext is called ciphertext.
• Using the same secret key and encryption algorithm run in
reverse(at 2), B can get plaintext of A, and thus the message is read
and security is maintained.
• The idea that uses in this technique is very old and that‘s why this
model is called conventional encryption.
Conventional encryption has mainly 5
ingredients :
1. Plain text –
It is the original data that is given to the algorithm as an input.
2. Encryption algorithm –
This encryption algorithm performs various transformations on plain text to convert it into ciphertext.
3. Secret key –
The secret key is also an input to the algorithm. The encryption algorithm will produce different outputs
based on the keys used at that time.
4. Ciphertext –
It contains encrypted information because it contains a form of original plaintext that is unreadable by a
human or computer without proper cipher to decrypt it. It is output from the algorithm.
5. Decryption algorithm –
This is used to run encryption algorithms in reverse. Ciphertext and Secret key is input here and it
produces plain text as output.
Requirements for secure use of conventional encryption :
1.Simple –
This type of encryption is easy to carry out.
2.Uses fewer computer resources –
Conventional encryption does not require a lot of computer resources
when compared to public-key encryption.
3.Fast –
Conventional encryption is much faster than asymmetric key
encryption.
DisAdvantages of Conventional encryption model:
3.If the receiver lost the key, he/she cant decrypt the message and thus
making the whole process useless.
4.This scheme does not scale well to a large number of users because both
the sender and the receiver have to agree on a secret key before
transmission.
LONG ANSWER QUESTIONS
1.Define Cryptography? Explain what is confidentiality using Conventional Encryption.
3.What is Blowfish.
4.Define RCS.
• The sender forwards the message along with the MAC. Now, we adopt that the
message is sent in the clear, as we are worried of providing message origin
authentication, not privacy. If confidentiality is essential then the message needs
encryption.
• On receipt of the message and the MAC, the receiver feeds the conventional
message and the shared secret key K into the MAC algorithm and re-computes the
MAC value.
• The receiver now checks equivalence of newly computed MAC with the MAC
received from the sender. If they match, then the receiver receives the message and
promises himself that the message has been sent by the proposed sender.
• If the calculated MAC does not match the MAC sent by the sender, the receiver
cannot conclude whether it is the message that has been changed or it is the origin
that has been falsified. As a bottom-line, a receiver securely assumes that the
message is not the genuine.
Limitations of MAC
• There are two main boundaries of MAC, both due to its symmetric nature of operation
−
• Establishment of Shared Secret.
• It can provide message authentication among pre-decided legitimate users who have shared key.
• This requires establishment of shared secret prior to use of MAC.
• Both these limits can be overcome by by means of the public key based digital
names debated in resulting section.
Hash Function:
• Hashing is a cryptographic method that transforms any
data type into a single text sequence. Any relational
database, regardless of the size or form, can be hacked.
• The hash generated by any data has always been the
same length irrespective of the size, form or complexity of
the data.
• A hash is intended to be a one-way feature — you can
accumulate information into a hacker algorithm and get a
single string, but you can't decode the data it contains until
you get the current hash.
• In a more scientific context, it's a method that uses a
statistical procedure to transform a different percentage of
the input data into a remedied bitstring.
• The idea of a Hash function will take input data and use it
to generate a single, nearly immutable, fixed-length output
value.
How does Hash Function Work?
1.This phenomenon means it is difficult to modify a hash function algorithmically. This asset
safeguards against an antagonist who only has a hash value and tries to locate the data.
2.This definition states that it is difficult to find another input with the same key given input and its hash.
It defends against an offender with input and its hash value and tries to overwrite a numerical
significance with a valid value instead of the original value.
Applications Of Hash Function In Cryptography
Hash algorithms are used to take a large message and produce a unique
short digest o With a cryptographically strong hash function:
•Different data (usually) maps into different digest values.
•It is hard to find two different data sets that will produce the same
hash value.
•It is hard to modify the data without changing the hash.
•It is hard to find data that will produce a given hash except by brute
force.
Hashing provides a way to make sure that two messages are equal
with a high level of confidence without the need to read the entire
message. Only the digest of a message is signed for efficiency. It
also allows ensuring that a received message was not changed after
it was transmitted by the sender. Only the digest of a message is
signed for efficiency.
Intel® DAL supports the one-way hashes:
•SHA-1
•SHA-256
•SHA-512
• Generally, the key pairs used for encryption/decryption and signing/verifying are different. The
private key used for signing is referred to as the signature key and the public key as the
verification key.
• Signer feeds data to the hash function and generates hash of data.
• Hash value and signature key are then fed to the signature algorithm which produces the digital
signature on given hash. Signature is appended to the data and then both are sent to the verifier.
• Verifier feeds the digital signature and the verification key into the verification algorithm. The
verification algorithm gives some value as output.
• Verifier also runs same hash function on received data to generate hash value.
• For verification, this hash value and output of verification algorithm are compared. Based on the
comparison result, verifier decides whether the digital signature is valid.
• Since digital signature is created by ‗private‘ key of signer and no one else can have this key; the
signer cannot repudiate signing the data in future.
Importance of Digital Signature
• Out of all cryptographic primitives, the digital signature using public key cryptography is
considered as very important and useful tool to achieve information security.
• Apart from ability to provide non-repudiation of message, the digital signature also provides
message authentication and data integrity. Let us briefly see how this is achieved by the
digital signature −
• Message authentication − When the verifier validates the digital signature using public key
of a sender, he is assured that signature has been created only by sender who possess the
corresponding secret private key and no one else.
• Data Integrity − In case an attacker has access to the data and modifies it, the digital
signature verification at receiver end fails. The hash of modified data and the output
provided by the verification algorithm will not match. Hence, receiver can safely deny the
message assuming that data integrity has been breached.
• Non-repudiation − Since it is assumed that only the signer has the knowledge of the
signature key, he can only create unique signature on a given data. Thus the receiver can
present data and the digital signature to a third party as evidence if any dispute arises in the
future.
Authentication Protocols
• an authentication protocol is a communication protocol. It can be encrypted or
designed to ensure the safe transfer of authenticated data between two or more
different parties.
• In order to make it easier to understand, we can try employing an analogy: Let‘s
say that you want to transfer some money from one bank to another. In order to do
this, you first need to complete the necessary documentation to prove that you are
the rightful owner of that money.
• Then, you would need to find secure vehicles for the transportation process since
you cannot put bankrolls on a handcart and merrily roll along.
• In addition, you would also need to ensure that the secure vehicles are not
identifiable for the safety of your money. All in all, it is not a wise idea to carry large
sums of money out in the open or tell people the license plate number of your
money loaded vehicles.
• Now, cryptography and authentication processes work very similarly: The
necessary documentation you submit to the bank is user verification and
authentication, secure vehicles are the authentication protocol and making sure
that your money filled vehicles are unidentifiable is the encryption of data.
Layer 7: Provides services such as e-mail, file HTTP, FTP, TFTP, DNS, SMTP, SFTP, SNMP,
Application transfers and file servers RLogin, BootP, MIME
Layer 5: Session Negotiates and establishes a SQL, X- Window, ASP, DNA, SCP, NFS, RPC
connection with another computer
Layer 3: Network Performs packet routing IP, OSPF, ICMP, RIP, ARP, RARP
Layer 2: Data link Provides error checking and transfer Ethernet, Token Ring, 802.11
of message frames
Layer 1: Physical Physically interfaces with EIA RS-232, EIA RS-449, IEEE, 802
transmission medium and sends
data over the network
Understand Types of Network Devices
• To build a strong network and defend it, you need to understand the devices that comprise
it. Here are the main types of network devices:
• Hubs connect multiple local area network (LAN) devices together. A hub also acts as a
repeater in that it amplifies signals that deteriorate after traveling long distances over
connecting cables. Hubs do not perform packet filtering or addressing functions. Hubs
operate at the Physical layer.
• Switches generally have a more intelligent role than hubs. Strands of LANs, are usually
connected using switches. Mainly working at the Data Link layer, they read the packet
headers and process the packets appropriately. Generally, switches can read the hardware
addresses of incoming packets to transmit them to the appropriate destination.
• Routers help transmit packets to their destinations by charting a path through the sea of
interconnected network devices. They remove the packets from the incoming frames,
analyze them individually and assign IP addresses. Routers normally work at the Network
layer of the OSI model.
Authentication Application:
• People
• Systems
• Applications
• Messages
Types of Authentication
• There are many different types of authentication that can
be used in an application. The selection of the most
appropriate type of authentication will depend on the needs
of the application; use this guide to determine which makes
the most sense for your application.
There are some important caveats when using basic authentication of which every
developer should be aware:
• Passwords are commonly weakly specified
• Identities can be spoofed and impersonated
• Passwords can be susceptible to theft
• Requires considerable effort to provide strong security
• Can be difficult to scale across distributed and large environments
Multi-Factor Authentication:
Multi-factor authentication is the use of a combination of authentication methods to validate identity. The most commonly
used description of multi-factor authentication is the use of information that is known only by the person, combined with
something in his or her possession. These are typically
• Smart cards
• One-time password/phrases
• Biometric information
Cryptographic Authentication:
The final form of authentication outlined here is that which utilizes cryptography. This includes the following
forms:
• Digital Signatures
• Message Authentication Code
• Password permutation
Electronic Mail:
Email
Email is a service which allows us to send the message in electronic mode over the
internet. It offers an efficient, inexpensive and real time mean of distributing information
among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is
known as Email address. Different users can send and receive messages according to
the e-mail address. E-mail is generally of the form username@domainname. For
example,
webmaster@tutorialspoint.com is an e-mail address where webmaster is username
and tutorialspoint.com is domain name.
•The username and the domain name are separated by @ (at) symbol.
•E-mail addresses are not case sensitive.
•Spaces are not allowed in e-mail address.
Advantages:
• E-mail has prooved to be powerful and reliable medium of commmunication. Here
are the benefits of E-mail:
• Reliable
• Convenience
• Speed
• Inexpensive
• Printable
• Global
• Generality
Disadvantages:
• Apart from several benefits of E-mail, there also exists some disadvantages as
discussed below:
• Forgery
• Overload
• Misdirection
• Junk
• No response
IP Security:
• The IP security (IPSec) is an Internet Engineering Task Force (IETF)
standard suite of protocols between 2 communication points across the IP
network that provide data authentication, integrity, and confidentiality. It also
defines the encrypted, decrypted and authenticated packets. The protocols
needed for secure key exchange and key management are defined in it.
• Uses of IP Security –
•
IPsec can be used to do the following things:
• To encrypt application layer data.
• To provide security for routers sending routing data across the public
internet.
• To provide authentication without encryption, like to authenticate that the
data originates from a known sender.
• To protect network data by setting up circuits using IPsec tunneling in which
all data is being sent between the two endpoints is encrypted, as with a
Virtual Private Network(VPN) connection.
Components of IP Security –
It has the following components:
Web security:
• In general, web security refers to the protective measures and
protocols that organizations adopt to protect the organization from,
cyber criminals and threats that use the web channel. Web security
is critical to business continuity and to protecting data, users and
companies from risk
• Web security must be a critical priority for every organization. Along
with email, the web is one of the top vectors for cyberattacks. The
web and the use of DNS services specifically are part of 91% of all
malware attacks, and email and web together are a key part for
99% of successful breaches.
• While the importance of web security is undisputed, protecting
against web security threats grows more challenging each day.
From thwarting attacks to dealing with limits in skills and resources,
IT security departments face serious challenges when trying to
secure the web.
Intruders:
• Intruders are the attackers who attempt to breach the security
of a network. They attack the network in order to get
unauthorized access. Intruders are of three types, namely,
masquerader, misfeasor and clandestine user.
• Masquerader is an external user who is not authorized to use a
computer, and yet tries to gain privileges to access a legitimate
user's account. Masquerading is generally done either using
stolen IDs and passwords, or through bypassing authentication
mechanisms.
• An Intrusion Detection System (IDS) is a system that
monitors network traffic for suspicious activity and issues
alerts when such activity is discovered. It is a software
application that scans a network or a system for harmful
activity or policy breaching. Any malicious venture or violation
is normally reported either to an administrator or collected
centrally using a security information and event management
(SIEM) system. A SIEM system integrates outputs from
multiple sources and uses alarm filtering techniques to
differentiate malicious activity from false alarms.
Firewall:
• A firewall is a type of protective layer between your computer(s) and the
Internet. When used correctly, a firewall prevents unauthorized use of and
access to your network.
• It analyzes the data that comes into and goes out of your computer.
Based on the rules in the firewall, specific data may be blocked or
discarded.
• Firewalls can be either hardware (a device) or software (a program). Your
computer setup should include both. You may think of a firewall as
something that only businesses need, but if your computer can get to
the Internet, you need a firewall!
• Hardware firewalls are separate devices from your individual computer(s).
They are often built into broadband modems and routers. If you have a
broadband connection, check your documentation or contact your ISP to
find out about your hardware firewall.
• Software firewalls are installed directly on each computer connected to
the
Internet. Computers with Windows XP or higher can use the built-in
Windows Firewall; Mac computers also come with a built-in firewall. Other
firewall programs are available for most types of computers. Some
firewalls are included with anti-virus or anti-spyware software.
LONG ANSWER QUESTIONS
1.Explain about Digital, Signatures and Authentication Protocols?
Risk model
• Cyber security risk modeling is the task of creating a variety of
risk scenarios, assessing the severity of each, and quantifying
the potential outcome if any scenario is realized – in a
language that makes sense to your business.
• Cyber risk modeling should not be confused with threat
modeling. Threat model frameworks help identify cyber
threats and vulnerabilities and inform and prioritize
mitigation efforts. On the other hand, cyber risk modeling is
an efficient and repeatable means of quantifying the
likelihood of a cyber-attack. With this insight, your business
can make robust decisions about where to focus investment
for the greatest ROI.
Example of cyber security risk modeling
1. Phishing
• This type of online fraud is designed to steal sensitive information, such as credit card numbers
and passwords. Phishing attacks impersonate reputable banking institutions, websites, and
personal contacts, which come in the form of immediate phishing e-mails or messages designed
to look legitimate.
• Once you click the URL or reply to the messages, you are prompted to enter your financial details
or use your credentials, which then sends your data to the malicious source.
2. Computer Viruses
• These are pieces of software designed to spread from one computer device to another. Mostly they are
downloaded from particular websites or sent as e-mail attachments with the intent of infecting your
computer as well as other computers on your contact list through systems on your network. They can
disable your security settings, send spam, steal and corrupt data from your computer, and even delete
every single thing on your hard drive.
• 3. Malware/Ransomware
• Malware is a malicious software mostly used by criminals to hold your system, steal your confidential
data, or install damaging programs in your device without your knowledge. It spreads spyware,
Trojans, and worms through pop-up ads, infected files, bogus websites, or e-mail messages.
• On the other hand, ransomware is a type of malware where the cyber-criminals lock your device
through a bad app or phishing emails then request a ransom to unlock the device. It can hinder you
from running applications, encrypting your files, and even from completely using your device.
Pretty Good Privacy (PGP) In 1991, Phil Zimmerman initially developed PGP as a
free email security application, which also made it possible to encrypt files and
folders. PGP works by using a public-private key system that uses the
International Data Encryption Algorithm (IDEA) algorithm to encrypt files and
email messages.
• Unauthorized Access
• Unauthorized Access
• Hijacking of Accounts
• Lack of Visibility
• External Sharing of Data
• Cyberattacks
Denial of Service Attacks
SECTION- A
1.What is Cryptography?
2. Write a short note on Conventional Encryption Model.
3. Define Steganography?
4. What is DES?
5. Write a short note on Conventional Encryption Algorithms?
6. Describe IDE Algorithm.
7. What is Blowfish.
8. Define RC5
SECTION-B
UNIT-I
(OR)
10.Write the differences between Block Cipher Design Principles and Modes of Operation.
UNIT-II
(OR)
12.Explain the Characteristics of Advanced Symmetric Block Ciphers.
INTERNAL EXAMINATIONS- II
SECTION-A
SECTION-B
UNIT-I
(OR)
UNIT-II
(OR)
1.What is Cryptography?
2. Write a short note on Conventional Encryption Model.
3. Write a short note on Conventional Encryption Algorithms?
4. Describe IDE Algorithm.
5. What is Modular Arithmetic?
6. Differentiate between Primary and Factorization.
7. Write a short note on Network Security Practice.
8. What are the applications of Authentication.
SECTION-B
UNIT-I
(OR)
10.Write the differences between Block Cipher Design Principles and Modes of Operation.
UNIT-II
(OR)
UNIT-III
13. Explain about Euler’s Theorem?
(OR)
UNIT-IV
(OR)
UNIT-V
(OR)