Practical Questions Theoretical Questions

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security Chapter 1
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Computer Science 101 Data Encryption And Computer Networks.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Cryptography
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Cryptography & Classical Ciphers
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Computer Security (CS4800)
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Chapter 6 Introduction to Digital Security
Cryptography and Network Security
Substitution Ciphers.
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Information Security.
Chapter 6 Introduction to Digital Security
Data & Network Security
CNET334 - Network Security
Columnar Transposition
Chapter 9 Security 9.1 The security environment
Information and Network Security
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
NET 311 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Lecture 1: Foundation of Network Security
PART VII Security.
Encryption on the Internet
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Introduction to Cryptography I
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Presentation transcript:

Practical Questions Theoretical Questions Revision on lecture 1 & 2 Practical Questions Theoretical Questions

Practical Questions

Question 1 Encrypt the following statement using Caesar cipher, let k =10. M e e t m e

Answer c = E(p) = (p + k) mod (26) c = E(p) = (p + 10) mod (26) a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 c = E(p) = (p + k) mod (26) c = E(p) = (p + 10) mod (26) e m t M 4 12 19 14 22 29 P+10 mod 26 14 22 24 o w d

Question 2 Encrypt the following statement using Vigenere cipher, let key = DEC. W a i t m e n o w a t t h e s t a t i o n

Vigenere Table

  A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Answer Encrypted Text: z e k w q g q s y d x v k i u w e v l s p o i t a s h w m Steps: look at the letter of the keyword above it ,and find that row in the Vigenere table. Find the column of your plaintext letter Trace down that column until you reach the row you found before and write down the letter in the cell where they intersect Encrypted Text: z e k w q g q s y d x v k i u w e v l s p

Question 3 Encrypt the following statement using Rail Fence cipher. M e e t m e a t t e n o c l o c k

Answer Encrypted Text: m e m a t n c o k e t e t e o l c k o c n t a m

Question 4 Encrypt the following statement using Rail fence cipher. S t a r t y o u r m i s s i o n

Answer Encrypted Text: s a t o r i s o t r y u m s i n o s i r t a n m

Question 5 Encrypt the following statement using Reverse cipher. S t a r t y o u r m i s s i o n r i g h t n o w

Answer Encrypted Text: w o n t h g i r n o i s s i m r u o y t r a t s

Question 6 Decrypt the following statement using Reverse cipher. n i a g a t i y r t r e v e t o n o d p o t s

Answer Decrypted Text: S t o p D o n o t e v e r t r y i t a g a i n

Question 7 Encrypt the following statement using Row Transposition cipher, let key = Computer. L e t s g o b a c k i m m e d i a t e l y

Answer C O M P U T E R 1 4 3 5 8 7 2 6

Answer 1 2 3 4 5 6 7 8 L e t s g o b a c k i m d l y x X

Answer Ciphertext: l s t g a b e o c m i m i d k e a l e y z z t z 1 4 3 5 8 7 2 6 L s t g a b e o c m i d k l y x Ciphertext: l s t g a b e o c m i m i d k e a l e y z z t z

Question 8 Construct a Play fair matrix with the key surprise

Answer j/i p r u s d c b a e l k h g f t q o n m z y x w v

Question 9 Using this Playfair matrix Encrypt this message: "The way is blocked"

Answer Th ew ay is bl oc ke dx ol av cw su dh qb fc bz

Theoretical Questions

Question 1 Discuss what the security trinity is. (Illustrate your answer by a diagram)

Answer Prevention: to provide some level of security, it is necessary to implement measures to avoid the exploitation of vulnerabilities. Detection: procedures need to be put in place to discover potential problems or security breaches. Response: Organizations need to develop a plan that identifies what is need to be protected

Question 2 Briefly discuss the three aspects of information security.

Answer According to the OSI Security Architecture Security Attack: Any action that compromise the security of information owned by an organization. Security Mechanism: A process that is designed to detect, prevent or recover from a security attack. Security Services: Security Services is the services to implement security policies and implemented by security mechanism

Question 3 What is the difference between the passive attack and the active attack? (Illustrate your answer by diagrams)

Answer Passive attack Active attack

Question 4 Write the appropriate terms for each definition: Assuring that the authorized users have timely access to the information in the system and to the network. ( Availability ) 2. Preventing either sender or receiver from denying a transmitted message. ( Non-repudiation )

Question 5 Define the following terms: 1. Computer Security Answer: generic name for the collection of tools designed to protect data and to thwart hackers. 2. Internet Security Answer: measures to protect data during their transmission. 3. Network Security Answer: measures to protect data during their transmission over a collection of interconnected networks.

Question 5 4. Threats Answer: mean anything that can interrupt the operation, functioning, integrity, or availability of a network or system, these can take any forms. 5. Vulnerabilities Answer: are inherent weakness in the design, configuration, implementation, or management of the network or the system that renders it to be susceptible to threats.