INS

 

Information and Network Security 

2170709

Important Question For GTU Exam

UNIT:-1

1) Define the types of cryptanalytic attacks.

2) List and explain various types of attacks on encrypted messages.

3) Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.

4) Explain Vegenere Cipher.

5) Define Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem.

6) Define Block Cipher. Explain Design Principles of block cipher.

7) Explain data confidentiality, data authentication and data integrity.

8) Explain rail fence Cipher technique.

9) Explain the terms diffusion and confusion.

10) Construct a Playfair matrix with the key “occurrence”. Generate the ciphertext for the plaintext “Tall trees”.

11) What is the objective of attacking an encryption system? Write the two approaches to attack a conventional encryption scheme.

12) Differentiate Symmetric and Asymmetric key cryptography.

 

UNIT:-2

1) Explain the fiestel structure of Blowfish and cast-128.

2) Explain RC5 encryption and decryption process.

3) List various modes of operations of block cipher. Explain any three of them briefly.

 

UNIT:-3

1) Explain the DES encryption algorithm.

2) Explain the Double DES encryption algorithm.

3) Explain the Triple DES encryption algorithm.

4) Explain various steps of AES.

 

UNIT:-4

1) Explain MD5 message-digest algorithm.

2) Write Diffie Hellman key exchange algorithm. Explain man-in-the-middle attack on this Diffie Hellman key exchange.

3) In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is plaintext M?

4) Describe the three operations used by International Data Encryption Algorithm.

 

UNIT:-5

1) Explain the operation of secure hash algorithm on 512 bit block.

 

UNIT:-6

1) Write the Euclid’s algorithm and show the steps of Euclid’s algorithm to find                    gcd(1970,1066).

2) Explain the overall operation of HMAC. Define the terms.

3) Explain MAC

4) Explain Elliptic curve algorithm.

 

UNIT:-7

1) What is dual signature and explain the construction of dual signature

2) Explain the digital signature algorithm in detail.

 

UNIT:-8

1) List and explain four general categories of schemes for the distribution of public keys.

2) Explain X.509 authentication service.

3) Discuss the ways in which public keys can be distributed to two communication parties.

4) What is public-key cryptography? Compare public it with conventional cryptography.

5) What is a trap-door one-way function? What is its importance in public-key cryptography?

 

UNIT:-9

1) Explain Kerberos in detail.

 

UNIT:-10

1) Explain the packet filtering router in case of the firewall.

2) Explain the secure socket layer handshake protocol action.

3) Explain the functions provided by S/MIME.

4) What are the security threats to E-commerce transactions?

5) Explain the general format of PGP(Pretty Good Privacy) message. Assume that message is going from A to B.

 6) Write the key features of secure electronic transactions.

7) Explain modes of operations of IPsec and applications of IPsec.

8) What is included in the authorization request sent by the merchant to the payment gateway in case of E-commerce transaction?

9) Explain the pseudorandom function used by Transport layer security.

10) Explain the use of firewall.

11) Explain Active Directory Services of Windows 2000 Server.

12) What parameters identify an SA(security association) and what parameters characterize the nature of SA(security association)?

No comments:

Post a Comment