IT INS

 

1.        Explain data confidentiality, data authentication and data integrity.

2.        Explain generation of encryption matrix in play fair cipher.

3.       Explain ceasor cipher.

4.       Apply brute force on ceasor cipher “PHHWPHDIWHUWKHWRJDSDUWB.

5.        Explain one time pad cipher with example.

6.        Explain rail fence Cipher technique

7.       Explain transposition technique with multiple round

8.       Apply brute force on ceasor cipher “FOBIQYYN”

9.       Define the term – confusion, diffusion

10.   Use Hill cipher to encrypt the text DEF. The key to be used is

2 4 5

9 2 1

3 8 7

11.   Using playfair cipher encrypt the plaintext “Why, don’t you?”. Use the key “keyword”.

12.   Use hill cipher to encrypt text pay. The key to be used is

17  17  5

21  18  21

2    2   19

13.   Using playfair cipher encrypt the plaintext “balloon” use the key “Monarchy”.

14.   Using playfair cipher encrypt the plaintext “mynameisatul” use the key “playfair example”

15.   Use hill cipher to encrypt the text cat. The key to be used is

6     29     1

13   16    10

20   17    15

16.   Using playfair cipher encrypt the plaintext “mynameisatul” use the key “harsh”.

17.   What is the difference between passive and active security threats? List and briefly define categories of passive and active security attacks.

18.   Define the term cryptanalysis. Explain various types of cryptanalytic attacks.

19.   Give examples of replay attacks. List three general approaches for dealing with replay attacks.

 

20.   Encrypt the message “Exam” using the Hill cipher with the key

2 4 5

9 2 1

3 8 7

 

21.   When an encryption scheme is said to be unconditionally secure and  computationally secure?

22.   Which type of substitution is called monoalphabetic substitution cipher?

23.   Which two principal methods are used in substitution ciphers to lessen the extent to which the structure of the plaintext survives in the ciphertext?

24.   Use playfair algorithm with key “monarchy” and encrypt the text “jazz”.

25.   What is security Services? Explain any three types of security services

26.   Explain Vegenere Cipher.

27.   What is security mechanism? List and explain various security mechanism.

28.   Explain the conventional security model used for information security.

29.   Explain cryptanalysis. Discuss any one technique for it

30.   What attacks can be done on encrypted text? Explain them.

31.   Explain play fair cipher with suitable example.

32.   Define the terms threat and attack. List and briefly define categories of security attacks.

33.   List and briefly define the security services.

34.   Construct a playfair matrix with the key “occurrence”. Generate the cipher text for the plaintext “Tall trees”

35.   Define the terms diffusion and confusion. What is the purpose of S-box in DES?

36.   Explain the avalanche effect in DES.

37.   Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.

38.   What  is  cryptography? 

39.    With example explain function of s-box in DES.

40.    Explain various steps of AES in short.

41.   Explain AES in detail

42.   Explain key generation in AES.

43.   Explain S-box generation in AES.

44.   Explain single round of DES algorithm.

45.   Explain the steps involved in International data encryption standard algorithm

46.   Explain scheme for DES encryption.

47.   Define Block Cipher. Explain Design Principles of block cipher.

48.   Explain DES algorithm with Figure.

49.   Explain Sub key generation Process in Simplified DES algorithm with Example.

50.   Explain limitation of DES in detail.

51.   Explain linear and differentical cryptanalysis?

52.   What is SAC and BIC?

53.   Explain double DES.

54.   Explain triple DES with two and three keys.

55.   What is meet in the middle attack?

56.   Explain cipher feedback mode of operation

57.   Explain Modes of Operations.

58.   Why mode of operation is defined? Explain the block cipher modes of operation?

59.    Explain Diffie - Hellman key exchange algorithm with example.

60.   What is man in the middle attack explain with example.

61.    Explain RSA algorithm with example.

62.   The encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and public key (e) is 3. Calculate the decryption key and calculate the ciphertext if the given plaintext is 7.

63.   Perform encryption using the RSA algorithm.

p=3,q=11(two random numbers).

e(encryption key)=7

M(plaintext message)=5

64.   What  is  primitive  root? Explain Diffi-Hellmen key exchange  algorithm with proper example.

65.   Elaborate various kinds of attacks on RSA algorithm.

66.   Explain computational aspects of RSA.

67.   Compare public key and private key cryptography. Also list various algorithms for each

68.   Briefly  explain  the  model  of  Asymmetric Cryptosystem.

69.   Explain RSA algorithm and list the possible approaches to attacking it.

70.   Perform  encryption  and  decryption  using  the  RSA  algorithm  for p=3,q=11, e=7, M=5.

71.   Compare conventional encryption with public key encryption.

72.   What  is  a trap-door  one-way function? What  is  its importance in public key cryptography?

73.   Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle attack? Justify.

74.   What   is   the   difference   between   weak   and   strong   collision resistance?

75.   What characteristics are needed in a secure hash function?

76.   Write the properties of hash functions.

77.   Explain SHA512 Algorithm.

78.   Explain hash function requirement and security.

79.   What characteristics are needed in a secure hash function?

80.   What is MAC? Explain HMAC.

81.   How  following  can  be  achieved  with  message  authentication: Message authentication, Message authentication and confidentiality

82.   How message authentication code can be used to achieve message authentication and confidentiality

83.   Explain MAC based on Block cipher.

84.   What are the advantages of HMAC.

85.   Explain MAC function requirement and security.

No comments:

Post a Comment