Cryptography and Network Security Year / Sem: III / VI

Author: zerlina // Category: ,
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: IT1352
Subject Name: Cryptography and Network Security Year / Sem: III / VI

UNIT I - INTRODUCTION
PART-A
1. What are the essential ingredients of a symmetric cipher?
2. What are the two basic functions used in encryption algorithms?
3. How many keys are required for two people to communicate via a cipher?
4. What is the difference between a block cipher and a stream cipher?
5. What are the two approaches to attacking a cipher?
6. What is the difference between an unconditionally secure cipher and a computationally secure
cipher?
7. Briefly define the Caesar cipher.
8. Briefly define the monoalphabetic cipher?
9. Briefly define the playfair cipher.
10. What are the two problems with one-time pad?
11. What is a transposition cipher?
12. What is Steganography?
13. Why is it important to study feistel cipher?
14. Why is it not practical to use an arbitrary reversible substitution cipher?
15. What is the difference between diffusion and confusion?
16. Which parameters and design choices determine the actual algorithm of a feistel cipher?
17. What is the purpose of the S-boxes in DES?
18. Explain the avalanche effect.
19. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher?
20. List the types of cryptanalytic attacks.
PART-B
1. Explain the OSI Architecture. (16)
2. Explain Classical Encryption Techniques. (16)
3. Describe about Traffic Confidentiality. (8)
4. Briefly explain about DES design criteria? (8)
5. Briefly describe about the Strength of DES? (8)
6. Briefly explain Block Cipher modes of Operation (16)
7. Briefly explain about AES design criteria? (16)
8. Explain Triple DES with neat diagram (8)
UNIT II – PUBLIC KEY ENCRYPTION
PART-A
1. What is the difference between differential and linear cryptanalysis?
2. Define product cipher.
3. What was the original set of criteria used by NIST to evaluate candidate AES cipher?
4. What was the final set of criteria used by NIST to evaluate candidate AES ciphers?
5. What is power analysis?
6. What is the purpose of the State array?
7. How is the S-box constructed?
8. Briefly describe Sub Bytes.
9. Briefly describe Shift Rows.
10. How many bytes in State are affected by Shift Rows?
11. Briefly describe Mix Columns.
12. Briefly describe Add Round Key.
13. Briefly describe the Key Expansion Algorithm.
14. What is the difference between Sub Bytes and Sub Word?
15. What is the difference between Shift Rows and Rot Word?
16. Why do some block cipher modes of operation only use encryption while others use both
encryption and decryption?
17. What is triple encryption?
18. What is a meet-in-the-middle attack?
19. How many keys are used in triple encryption?
20. What is the key size for Blowfish?
PART-B
1. Explain about the various Key management techniques. (16)
2. Describe Diffie-Hellman Key Exchange. (16)
3. Explain RSA algorithm. (8)
4. Describe Public Key Cryptography. (8)
5. Explain Elliptic Curve Architecture. (16)
UNIT III - AUTHENTICATION AND HASH FUNCTION
PART-A
1. What primitive operations are used in Blowfish?
2. What common mathematical constants are used in RC5?
3. What primitive operations are used in RC5?
4. List important design considerations for a stream cipher.
5. Why is it not desirable to reuse a stream cipher key?
6. What primitive operation is used in RC4?
7. For user workstation in a typical business environment, list potential locations for confidentiality
attacks.
8. What is the difference between link and end-to-end encryption?
9. What types of information might be derived from a traffic analysis attack?
10. What is traffic padding and what is its purpose?
11. List ways in which secret keys can be distributed to two communicating parties.
12. What is the difference between a session key and a master key?
13. What is nonce?
14. What is key distribution center?
15. What is the difference between statistical randomness and unpredictability?
16. What is the difference between Rijndael and AES?
17. Why is the middle portion of 3DES a decryption rather than an encryption?
18. What is the difference between the AES decryption algorithm and the equivalent inverse cipher?
PART-B
1. Explain Authentication Functions. (16)
2. Briefly Explain HMAC algorithm. (8)
3. Describe RIPEMD-160. (16)
4. Explain Hash Functions. (16)
5. Explain Digital Signature Standard. (8)
6. Briefly explain about MD5 algorithm? (8)
7. Briefly describe about the Secure Hash Algorithm? (8)
8. Explain authentication protocol (8)
UNIT IV NETWORK SECURITY
PART - A
1. Define Kerberos.
2. What are the requirements involved in Kerberos?
3. Define Kerberos Realm.
4. What are the technical deficiencies involved in the Kerberos Version 4?
5. What are the elements include in the Public-Key Certifications?
6. What are the two types of Certificates?
7. Define PGP.
8. Define Public Key Management.
9. Define S/MIME.
10. Define Multipart type.
11. What are the applications involved in IP Security?
12. What are the IP Security Mechanisms?
13. Define Authentication Header.
14. Define Authentication Data.
15. Define Padding.
16. What are the services provided by the SSL Record Protocol?
17. What are the key features of SET?
18. Define Certification Authority.
19. What are the Applications required by the Kerberos Servers?
PART – B
1. Define Kerberos Version 4.(16)
2. Define Kerberos Version 5.(16)
3. Explain briefly about X.509 Authentication Service.(16)
4. Discuss about the concept of Electronic Mail Security.(16)
5. Define S/MIME.(8)
6. Discuss briefly about IP Security.(16)
7. Explain with elaborate about the Web Security Considerations.(16)
8. Explain briefly about the Secure Electronic Transaction.(16)
9. Explain in detail about the IP Security Architecture(16)
10. Explain in detail about the Authentication Header.(16)
11. Discuss briefly about Pretty Good Privacy.(8)
UNIT V SYSTEM LEVEL SECURITY
PART – A
1. Define Masquerader.
2. Define Misfeasor.
3. Define Clandestine User.
4. What are the Techniques involved in intrusion?
5. What are the approaches involved in the Intrusion Detection?
6. Define Rule-Based Anomaly detection.
7. What re the Major issues derived by Porras about the design of a distributed intrusion
detection system?
8. What are the three main components involved in the distributed intrusion Detection
System?
9. Define Honeypots.
10. What are the three purposes defined by salt?
11. Define Computer generated passwords.
12. Define reactive password checking.
13. Define Trojan Horses.
14. Define Logic Bomb.
15. Define Virus.
16. What are the four phases involved in the Virus?
17. List out the types of Viruses?
18. What are the Characteristics of Firewall?
PART – B
1. List and briefly define three classes of Intruders.(8)
2. List and briefly define four techniques used to avoid guessable passwords.(8)
3. What is the role of compression in the operation of a virus?(16)
4. What is the role of encryption in the operation of a virus?(16)
5. What is DDoS?(8)
6. Explain briefly about the trusted systems.(16)

0 Responses to "Cryptography and Network Security Year / Sem: III / VI"

Post a Comment

Followers