Sunteți pe pagina 1din 3

Subject Code Subject

: :

EM552 Cryptography and Network security

UNIT- I PART-A 1. Differentiate threat and Vulnerability. 2. When the system will get attack and what is the way to avoid attack? 3. What is the meaning of computer security? 4. What is the difference between interception and interruption? 5. What are all the three things the attackers must have? 6. Write short notes on Hardware Vulnerabilities. 7. What is Trojan horse and trapdoor? 8. What is Data integrity? 9. Write short notes about Computer criminals 10. Differentiate Hardware and software controls. 11. What is the use of policies and procedures? 12. What are all the ways the computers has been used by terrorists? 13. Who is called Amateur? 14. What is the principle of adequate protection? PART B 1. What is Vulnerability and explain about types of Vulnerabilities. 2. What is Computer intrusion? Explain Characteristics of computer intrusion. 3. Explain classes of threats. 4. Explain about Security Goals 5. Explain about (i) Crackers (ii)Career criminals (iii)terrorists 6. Explain Effectiveness of control in Defense. 7. Explain about Controls that attempt to prevent exploiting a computing systems vulnerabilities. 8. List at least three kinds of harm a company could suffer when the integrity of a program or company data is compromised. UNIT- II PART-A 1. What is cryptography? 2. What is plain text and ciphertext? 3. What is symmetric cipher.

4. What are the two basic functions used in encryption algorithms? 5. How many keys are required for two people to communicate via a cipher? 6. What is the difference between a block cipher and a stream cipher? 7. What are the two general approaches to attacking a cipher? 8. List and briefly define types of cryptanalytic attacks based on what is known to the attacker. 9. What is the difference between an unconditionally secure cipher and a computationally secure cipher? 10. What is Caesar cipher? 11. What is monoalphabetic cipher. 12. Briefly define the Playfair cipher. 13. What are two problems with the one-time pad? 14. What is a transposition cipher? 15. What is steganography? 16. What is the difference between diffusion and confusion? 17. What is the purpose of the S-boxes in DES? 18. What are the basic elements of a public-key cryptosystem? 19. What are the roles of public and private key? 20. What are three broad categories of applications of public-key cryptosystems? PART-B 1. Draw the block diagram and explain cryptosystem. 2. Explain all the Substitution techniques 3. Explain simplified DES algorithm with neat diagram. 4. Draw a neat diagram of general depiction of DES Encryption algorithm and explain. 5. Explain RSA public key encryption and give one example. 6. Perform encryption and decryption using the RSA algorithm.] a. p=3;q=11,e=7;M=5 b. p=5; q=11, e=3; M=9

7. In an RSA algorithm, the public key of a given user is e=31,n=3599. What is the private key of this user?

UNIT-III PART-A 1. What is fence? 2. Write basic separation methods of Operating system. 3. What is segmentation and where it is needed?

4. Define briefly paging. 5. Give some examples of the kinds of objects for which protection is desirable. 6. Give short notes about Kerberos. 7. Why file protection is important? 8. What is the use of passwords? 9. Which systems are called Loose-Lipped Systems? 10. Who is called indiscreet users? 11. What is the advantage of One-Time Passwords? 12. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or Why not? PART-B 1. Explain Security methods of operating system. 2. Explain Memory and address protection by using proper diagram 3. With neat diagram explain Control of access to general objects. 4. Explain File protection mechanism and it types. 5. Explain the ways of attacks on passwords. 6. Explain the methods of selecting passwords. 7. Explain Fixing Flaws in the authentication process.

S-ar putea să vă placă și