Information and Network Security
2170709
UNIT:-1
1) Define
the types of cryptanalytic attacks.
2) List and
explain various types of attacks on encrypted messages.
3) Explain
monoalphabetic cipher and polyalphabetic cipher by giving an example.
4) Explain
Vegenere Cipher.
5) Define
Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem.
6) Define
Block Cipher. Explain Design Principles of block cipher.
7) Explain
data confidentiality, data authentication and data integrity.
8) Explain
rail fence Cipher technique.
9) Explain
the terms diffusion and confusion.
10) Construct a Playfair matrix
with the key “occurrence”. Generate the ciphertext for the plaintext “Tall
trees”.
11) What is the objective of
attacking an encryption system? Write the two approaches to attack a
conventional encryption scheme.
12) Differentiate Symmetric and
Asymmetric key cryptography.
UNIT:-2
1)
Explain the fiestel structure of Blowfish and cast-128.
2)
Explain RC5 encryption and decryption process.
3) List various modes of
operations of block cipher. Explain any three of them briefly.
UNIT:-3
1) Explain
the DES encryption algorithm.
2) Explain
the Double DES encryption algorithm.
3) Explain
the Triple DES encryption algorithm.
4) Explain various steps of
AES.
UNIT:-4
1)
Explain MD5 message-digest algorithm.
2)
Write Diffie Hellman key exchange algorithm. Explain man-in-the-middle attack
on this Diffie Hellman key exchange.
3) In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is plaintext M?
4) Describe the three operations used by International Data Encryption Algorithm.
UNIT:-5
1) Explain the operation of
secure hash algorithm on 512 bit block.
UNIT:-6
1) Write
the Euclid’s algorithm and show the steps of Euclid’s algorithm to find
gcd(1970,1066).
2) Explain
the overall operation of HMAC. Define the terms.
3) Explain
MAC
4) Explain Elliptic curve
algorithm.
UNIT:-7
1) What is dual signature and explain the construction of
dual signature
2) Explain the digital signature algorithm in detail.
UNIT:-8
1) List and explain four general categories of schemes
for the distribution of public keys.
2) Explain X.509 authentication service.
3) Discuss the ways in which public keys can be
distributed to two communication parties.
4) What is public-key cryptography? Compare public it
with conventional cryptography.
5) What is
a trap-door one-way function? What is its importance in public-key
cryptography?
UNIT:-9
1) Explain Kerberos in detail.
UNIT:-10
1)
Explain the packet filtering router in case of the firewall.
2)
Explain the secure socket layer handshake protocol action.
3)
Explain the functions provided by S/MIME.
4)
What are the security threats to E-commerce transactions?
5) Explain the general format
of PGP(Pretty Good Privacy) message. Assume that message is going from A to B.
7)
Explain modes of operations of IPsec and applications of IPsec.
8)
What is included in the authorization request sent by the merchant to the payment
gateway in case of E-commerce transaction?
9)
Explain the pseudorandom function used by Transport layer security.
10)
Explain the use of firewall.
11)
Explain Active Directory Services of Windows 2000 Server.
No comments:
Post a Comment