Tuesday, 12 March 2013

Network Security study guide for WBUT CSE students

blogger counter | dedicated server



Here  I would try to help those CSE students of WBUT,Kolkata who are preparing for their 8th semester Network Security paper which is an elective and obviously one of the most interesting subjects for CSE students.
Here I would recommend  3 books if you wish to study Network Security in accordance with the prescribed WBUT syllabus:

1.Network Security Essentials :William Stallings 4th Edition <WBUT Syllabus is set according to the contents of this book but this text book is not for beginners >


2.Cryptography and Network Security :Atul Kahate Second Edition <Best book for beginners and I would recommend every student to thoroughly go through the chapters in accordance with the WBUT syllabus>


3. Cryptography and Network Security:Behrouz A. Forouzan Tata McGraw Hill<Special Indian Edition 2007>

Now I would give you a comprehensive  study guide  regarding the topics from the WBUT syllabus and the corresponding books from which you can study them for your exam purposes.


1.Module 1:Introduction [3]

Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network Security

These topics are explained lucidly in Forouzan Chapter 1.1,1.2,1.3,1.4 and William Stallings Chapter 1.6.Read them in detail and the first module of your syllabus is over.


2.Module 2:Conventional Encryption and Message Confidentiality [8] 

Conventional Encryption Principles,  Conventional Encryption Algorithms, Location of Encryption Devices, Key Distribution.


Read from Atul Kahate 
chapter 2.1,2.2,2.3(2.3.1,2.3.2,2.3.3,2.3.4,2.3.5,2.3.6,2.3.7,2.3.8),2.4(2.4.1,2.4.2,2.4.3,2.4.4),2.5,2.6(2.6.1,2.6.2),2.7,2.8,2.9


Module 3:Public Key Cryptography and Message Authentication [8] 

Approaches to Message Authentication,        SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures, Key Management

Read from Atul Kahate 
chapter 3.2(3.2.1,3.2.2),3.3,3.4(3.4.1,3.4.2,3.4.3),4(4.2,4.3,4.4.1,4.4.2,4.4.3,4.5.1,4.5.2,4.6.1,4.6.2,4.6.3,4.6.4)


Network Security Applications [4]

Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational Description  
Read from Atul Kahate 
chapter 
6.11.3,7.7(7.7.2,7.7.3)


                    
                                                                                        TO BE CONTINUED...
                                                                                          Regards Anirban Basu
                                                                                          8017204158










CS802D Network Security syllabus Sem:8 Dep:CSE



Network Security Code:
CS 802D       Credits: 3

Introduction [3] Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network Security

 Conventional Encryption and Message Confidentiality [8] Conventional Encryption Principles,  Conventional Encryption Algorithms, Location of Encryption Devices, Key Distribution

  Public Key Cryptography and Message Authentication [8] Approaches to Message Authentication,        SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures, Key Management

  Network Security Applications [4] Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational Description

  IP Security [2] IP Security Overview, IP Security Architecture, Authentication Header

  Web Security [7] Web Security Threats, Web Traffic Security Approaches, Overview of Secure Socket Layer and Transport Layer Security, Overview of Secure Electronic Transaction

  Intruders and Viruses [4] Intruders, Intrusion Techniques, Password Protection, Password Selection Strategies, Intrusion Detection, Malicious Programs, Nature of Viruses, Types of Viruses, Macro Viruses, Antivirus Approaches

  Firewalls [3] Firewall Characteristics, Types of Firewalls, Firewall Configuration

 Text Books: 
Network Security Essentials:Applications and standards:4th edition :William Stallings 
Cryptography And Network Security By Atul Kahate 
Cryptography And Network Security By Behrouz A. Forouzan

FREE DOWNLOAD Ebooks on Network Security and Cryptography

Monday, 11 March 2013

Question Bank for Network Security CS 802D WBUT Sem 8 CSE


                         Network Security & Cryptography (CS 802 D)
                                      

                                               Multiple Choice Questions
1. The principle of ___________ensures that only the sender and the intended recipients have
    access to the contents of a message.
    a. confidentiality        b. authentication          c. integrity d. access control
2. If the recipient of a message has to be satisfied with the identify of the sender, the principle
    of _________ comes into picture.
    b. Confidentiality b. authentication                 c. integrity d. access control
3. If we want to ensure the principle of ______ modified while in transit.
    (a) confidentiality (b) authentication         (c) integrity          (d) access control
4. Allowing certain users specific accesses comes in the purview of
    (a) confidentiality (b) authentication (c) integrity              (d) access control
5. If a computer system is not accessible, the principle of _____________
    (a) confidentiality (b) authentication (c) availability (d) access control
6. The four primary security principles related to a message are
         (a) confidentiality, authentication, integrity and non-repudiation
         (b) confidentiality, access control, non-repudiation and integrity
         (c) authentication, authorization, non-repudiation and availability
         (d) availability, access control, authorization and authentication
7. While creating a digital envelope, we encrypt the_____ with the ______ .
    (a) sender's private key, one-time session key (b) receiver's public key, one-time session
key
    (c) one-time session key, sender's public key            (d) one-time session key, receiver's public
key
8. Symmetric key cryptography is _______ asymmetric key cryptography.
    (a) always slower than (b) of the same speed as                   (c) faster than      (d)       usually
slower than
9. The _____ attack is related to authentication.
    (a) interception          (b) fabrication (c) modification            (d) interruption
10. The ______ attack is related to integrity.
    (a) interception          (b) fabrication (c) modification            (d) interruption
11. The ____________ attack is related to availability.
    (a) interception          (b) fabrication (c) modification            (d) interruption
12. In _______ attacks, there is no modification to message contents.
    (a) passive      (b) active (c) both of the above (d) none of the above
13. In _____________ attacks, the message contents are modified.
    (a) passive      (b) active (c) both of the above (d) none of the above
14. Interruption attacks are also called as ___________ attacks.
                                                                              (d) replay attacks
    (a) masquerade            (b) alteration (c) denial of service
15. DOS attacks are caused by ______________
    (a) authentication        (b) modification           (c) fabrication           (d) replay attacks
16. Virus is a computer
    (a) file              (b) program          (c) database           (d) application software
17. A worm ________ modify a program.
    (a) does not               (b) does        (c) mayor may not          (d) may
18. A_______ replicates itself by creating its own copies, in order to bring the network to a
    halt.
    (a) virus            (b) worm          (c) Trojan horse           (d) bomb
19. Applets and ActiveX controls are side programs.
    (a) client       (b) server       (c) database           (d) none of the above
20. ActiveX controls are _________ secure as compared to applets.
    (a) more         (b) equally      (c) far more           (d) less
21. The language that we commonly use can be termed as
                                             Academy of Technology
                                                                                                   2
    (a) pure text        (b) simple text (c) plain text (d) normal text
22. The codified language can be termed as
    (a) clear text (b) unclear text           (c) code text        (d) cipher text
23. In substitution cipher, the following happens.
    (a) characters are replaced by other characters (b) rows are replaced by columns
    (c) columns are replaced by rows (d) none of the above
24. Transposition cipher involves
    (a) replacement of blocks of text with other blocks
    (b) replacement of characters of text with other characters
    (c) strictly row-to-column replacement
    (d) some permutation on the input text to produce cipher text
25. Caesar Cipher is an example of
    (a) Substitution Cipher          (b) Transposition Cipher (c) Substitution as well as
    Transposition Cipher (d) none of the above
26. Vernam Cipher is an example of
    (a) Substitution Cipher (b) Transposition Cipher (c)              Substitution   as    well   as
    Transposition Cipher (d) none of the above
27. Cryptanalyst is a person who
    (a) devises cryptography solutions (b) attempts to break cryptography solutions
    (c) none of these (d) both of these
28. Homophonic Substitution Cipher is _________ to break as compared to Mono-alphabetic
    Cipher.
    (a) easier (b) the same          (c) difficult         (d) easier or same
29. The process of writing the text as diagonals and reading it as sequence of rows is called as
     (a)Rail Fence Technique           (b) Caesar Cipher
    (c) Mono-alphabetic Cipher (d) Homophonic Substitution Cipher
30. The mechanism of writing text as rows and reading as columns is called as_______
    (a) Vernam Cipher (b) Caesar Cipher (c) Simple Columnar Transposition Technique
    (d) Homophonic Substitution Cipher
31. Vernam Cipher is also called as
    (a) Rail Fence Technique (b) One-time pad (c) Book Cipher (d) Running Key Cipher
32. Book Cipher is also called as
    (a) Rail Fence Technique (b) One-time pad (c) Mono-alphabetic Cipher (d) Running
Key Cipher
33. Conversion of plain text into cipher text is called as
    (a) encryption (b) decryption (c) cryptography (d) cryptanalyst
34. Conversion of cipher text into plain text is called as
    (a) encryption (b) decryption (c) cryptography (d) cryptanalyst
35. _________ increases the redundancy of plain text.
    (a) Confusion (b) Diffusion (c) Both confusion and diffusion               (d) Neither confusion
    nor diffusion
36. ______________ works on block mode.
    (a) CFB            (b) OFB       (c) CCB             (d) CBC
37. DES encrypts blocks of ________ bits.
        (a) 32 (b) 56 (c) 64              (d) 128
38. There are _________ rounds in DES.
    (a) 8        (b) 10 c) 14 (d) 16
39. _________is based on the IDEA algorithm.
    (a) S/MIME (b) PGP             (c) SET           (d) SSL
40. A _______ is used to verify the integrity of a message.
    (a) message digest (b) decryption algorithm (c) digital envelope (d) none of the above
41. When two different message digests have the same value, it is called as
    (a) attack (b) collision         (c) hash          (d) none of the above
42. The final solution to the problem of key exchange is the use of_____
                                           Academy of Technology
                                                                                                 3
    (a) passport         (b) digital envelope (c) digital certificate         (d) message digest
43. To solve the problem of trust, the ______is used.
     (a) public key (b) self-signed certificate       (c) private key (d) digital signature
44. SSL layer is located between_______
    (a) transport layer, network layer (b) application layer, transport layer
    (c) data link layer, physical layer (d) network layer, data link layer
45. Firewall should be situated_______
    (a) inside a corporate network(b) outside a corporate network
    (c) between a corporate network and the outside world (d) none of these
46. Firewall is a specialized form of a _________
    (a) bridge (b) disk          (c) printer (d) router
47. A packet filter examines_______ packets.
    (a) all (b) no (c) some (d) alternate
48. _______ adapts itself to the changing conditions.
    (a) Stateless static filter (b) Static packet filter
    (c) Adaptive packet filter (d) Stateful packet filter
49. Application gateways are ___________ packet filters.
    (a) less secure than (b) more secure than (c) equally secure to                (d) slower
50. IPSec provides security at the _______________
    (a) application      (b)transport         (c) network (d) session
51. If the sender encrypts the message with her private key, it achieves the purpose of
    (a) confidentiality (b) confidentiality and authentication
    (c) confidentiality but not authentication (d) authentication
52. In asymmetric key cryptography,_______ keys are required per communicating
         (a) 2      (b) 3        (c) 4            (d) 5
53. The private key _______________________
    (a) must be distributed               (b) must be shared with everyone
    (c) must remain secret with an individual          (d) none of the above
54. If A and B want to communicate securely with each other, B must not know
    (a) Xs private key (b) Xs public key (c) B's private key (d) B's private key
55. _________are very crucial for the success of asymmetric key cryptography.
    (a) Integers         (b) Prime numbers (c) Negative numbers (d) Fractions
  
                                                     5 Marks Questions
1. What is the difference between passive and active security threats?
2. What is the difference between an unconditionally secure cipher and a computationally
    secure cipher?
3. Briefly define the Playfair cipher.
4. Explain different types of attacks with examples.
5. Explain Simple Columnar Transposition Technique of symmetric encryption. Convert
    the text “ACADEMY OF TECHNOLOGY” with the key value 31254.
6. What is the difference between diffusion and confusion?
7. Explain the key generation process in DES.
8. What is the purpose of the S-boxes in DES?
9. Explain the avalanche effect.
10. What is the difference between differential and linear cryptanalysis?
11. What is a meet-in-the-middle attack?
12. Why is the middle portion of 3DES a decryption rather than an encryption?
13. What is a trapdoor one-way function?
14. What is a message authentication code?
15. What is the role of a compression function in a hash function?
16. What are the properties a digital signature should have?
17. What are the five principal services provided by PGP?
                                        
18. What is the utility of a detached signature?
19. What services are provided by IPSec?
20. List four techniques used by firewalls to control access and enforce a security policy.
21. What are some weaknesses of a packet-filtering router?
22. What is an application-level gateway?
23. What is a circuit-level gateway?
24. What is a salt in the context of UNIX password management?
25. What services are provided by the SSL Record Protocol?
26. What steps are involved in the SSL Record Protocol transmission?
27. How is SHTTP different from SSL?
28. Explain the concepts of key rings in PGP.
29. a) Discuss about the four basic principles related to the security of a
                 massage.
    b) What is availability?
30.             Explain digital signature. Provide a scheme for implementing digital signature
                using public key cryptography.
31.             What is cryptography? What is cryptanalysis?
32.             Compare the characteristic of SHA -1 and MD-5 algorithms. What is a firewall?
33. Describe Diffie-Hellman symmetric key exchange algorithm.
                                    

                                          15 Marks Questions

1. a.   What do you mean by network security explain with a suitable model.
    b.  What is Brute-force attack? Explain.
    c.  What is Worm? What is the difference between Worm and Virus?
    d.  What is Trojan? What is Cookie?
    e.  What are the key principles of security?

2. Explain substitution, transposition cipher and product cipher.
    b. Briefly define the Playfair cipher. Find the cipher text for the plain text “ACADEMY
        OF TECHNOLOGY” using Playfair cipher technique. The key here is
        “ADISAPTAGRAM”. Also find the decrypted cipher text.

3. a. What do you mean by asymmetric key encryption? Explain.
    b. What is the difference between symmetric key encryption and asymmetric key
        encryption?
    c. Describe CBC mode of encryption process. What is Initialization Vector?
    d. Discuss the idea of algorithm modes.

4. a.   Distinguish between differential and linear cryptanalysis.
    b.  What is the difference between stream cipher and block cipher?
    c.  How can the same key be reused in triple DES?
    d.  What is key wrapping? How is it useful?

5. a.   What are the key requirements of message digest?
    b.  What are the problems with exchanging of public keys?
    c.  Explain RSA algorithm.
    d.  ”Symmetric key cryptography is faster than Asymmetric key cryptography”- Justify.

6. a.   What do mean by “Digital Signature”?
    b.  What is the difference between MAC and message digest?
    c.  What is the real crux of RSA?
    d.  What is the key size for Blowfish?

7. a. What is the purpose of the S-boxes in DES?
                                         Academy of Technology
                                                                                             5
    b. In the public-key system using RSA, you intercept the cipher text CT=10 sent to a
       user whose public key is E=5, N=35. What is the plain text PT?
    c. What are the roles of the public and private key?
    d. In an RSA system, the public key of a given user is E=31, N=3599. What is the private
       key of the user?

8. a. What are the three aspects of a 3-factor authentication?
    b. What is SSO? Discuss its two approaches.
    c. How MD5 algorithm works?
    d. What is the difference between little-endian and big-endian format?

9. a.  What protocols comprise SSL?
    b. What is a dual signature and what is its purpose?
    c. Give examples of applications of IPSec.
    d. What services are provided by IPSec?

10. a. Why is the SSL layer positioned between Application layer and Transport layer?
    b. Name the four key steps in the creation of a Digital certificate.
    c. How is SHTTP different from SSL?
       What are the problems associated with clear text passwords?
    d.

11. a. List and briefly define three classes of intruders.
    b. What are two common techniques used to protect a password file?
    c. What is honeypot?
    d. What is the salt in the context of UNIX password management?


12. a. What is firewall?
    b. What are the three main actions of a packet filter?
    c. List the characteristics of a good firewall implementation.
    d. What are the limitations of a firewall?
    e.

13. a) What are the different types of attacks against security?
       b)      How an application level attack is characteristically different from aq network
               level attack?
       c)      Differentiate between an active attack and a passive attack?
       d)      Why do you use digital signature? What are digital certificates?

14. a) Different between a block cipher and a stream cipher.
    b) state and explain RSA algorithm.
       c)      Explain how the diffie-Hellman key exchange algorithm might become
               vulnerable.

15. a) explain the following:
       i) Static web page
               ii) Dynamic web page
               iii)    Active web page
       b)      Explain with a figure how secure sockets layer(ssl) is accommodated in TCP/IP
               protocol suite.
       c)      Explain what are the three sub-protocol in SSL?
       d)      Explain the position of SHTTP in TCP/IP protocol suite.

16. a) Compare substitution cipher and transposition cipher. What is secure
                DNS ? Give its utility.
       b)      What are viruses and antivirus ?
       c)      Describe IP security architecture in brief.
                                                                                                                                      
17. a) What is WEP?
        b)      Using RSA public key cryptography system with a=1,b=2,etc.If p=5,q=11,and
                d=27,find e and encrypt(cad).
        c)      How is SSTTP different from SSL?
        d)      describe the functioning of Massage Authentication Code(MAC).

18.     Write short notes of any three of the following.
        a)      Kerberos
        b)      PGP
        c)      Applet and active-X controls
        d)      DNS spoofing
        e)      Secure Electronic Transaction(SET)

19. a). How many rounds are there in DES?
  b). Describe a single round of DES with block diagram.
  c). What is Triple DEA? Why is it more secure than DES?
  d). “Authentication can be achieved using DES.” – Comment on it.

20. a). What is electronic money?
  b). What is SET? Explain with a suitable model.
  c). How pre-master-secret and master-secret is prepared in SSL handshake protocol?
  d). Describe he fields of SSL records protocol header.

21. a). Describe SHA-1(message digest) algorithm.
  b). How SHA-1 is differing from Md5?
  c). It is known that, in symmetric-key cryptography, it is difficult to share the same secret
      between two communicating parties. How can public-key cryptography solve this
      problem?
  d). Give an example of a message authentication using symmetric-key and asymmetric-key
      cryptography.