Sunteți pe pagina 1din 5

CMR Institute of Technology, Bangalore

Department(s)

: ECE

Semester

: 08

Subject Title

: NETWORK SECURITY

Course Instructor

: HARSHA B. K.

Course duration

: 2 Feb. 2015 12 May 2015

Section(s)

:A&B
Subject Code:10EC832

Lectures/week: 05

QUESTION BANK
Unit- I INTRODUCTION
1. Draw the model of network security. Explain it briefly
2. Distinguish between passive and active attacks. Discuss the functioning of following
attacks with diagrams
a) Masquerade b) Replay C) modification of messages d) Denial of service
3. Give the table showing relationship between security services and mechanisms
4. Explain Gatekeeper function and security recovery
5. Classify the various security attacks and define them
6. Explain the types of attacks on encrypted messages.
7. List the different security mechanisms defined in X.800

Unit- 2 SYMMETRIC CIPHERS


1.
2.
3.
4.
5.

Distinguish between block cipher and stream cipher with examples.


Explain block cipher design principles.
Briefly describe about Steganography.
Distinguish between linear and differential cryptanalysis.
Which parameters and design choices determine the actual algorithm of a Feistal
cipher?
6. With a neat schematic, explain the single round DES encryption model.
7. Explain the operation of Caesar Cipher with an algorithm. Derive the Cipher with an
algorithm. Derive the Cipher text using Caesar Cipher for the following plain text
message WORK IS WORSHIP.
8. With a block diagram, explain Feistal encryption and decryption algorithm.
9. Write a note one time pad.
10. Create a play fair matrix using key word COMPUTER and hence obtain the cipher text
for the plain text message parrot.
11. With a block diagram, explain DES encryption ad key generation techniques.
12. Describe the block cipher modes of operation in detail.
13. In S-DES, the plain text is 11110010 and key is 1011100110. Find cipher text.
14. Explain the strength of DES.
15. Encrypt the plaintext CRYPTOGRAPHY using Hill Cipher technique. Key =

16. Encrypt the plaintext= SECURITY using Hill Cipher technique. Key =
17. In S-DES, 10 bit key is 1010000010. Find the subkeys and, if = 3 5 2 7 4 10 1
9 8 6 and = 6 3 7 4 8 5 10 9
18. Discuss the evaluation criteria of AES
19. With a schematic diagram, explain the S- DES encryption and decryption process,
highlighting the key generation phase.
20. Explain the counter mode of block ciphers. What are its advantages?

UNIT- 3 PUBLIC KEY CRYPTOSYSTEMS


1. Discuss Deffie Hellman key exchange algorithm. Explain how the algorithm is used to
exchange secret key.
2. Explain RSA algorithm in detail and discuss its security.
3. What requirement must a public key cryptosystem fulfill to be a secure algorithm?
4. Users A and B use the Diffie- Hellman key exchange technique with a common prime
q=11 and a primitive root =5.
i)
If user A has private key =3, what is As public key?
ii)
If user B has private key =2, what is Bs public key?
iii)
What is the shared secret key and?
5. Explain the different techniques proposed for distribution of public keys.
6. In RSA system it is given p=7,q=11,e=17,M=8. Find the cipher text C. Also find M from
decryption.
7. Users A and B use the Diffie- Hellman key exchange technique with a common prime
q=71 and a primitive root =7.
i) If user A has private key =5, what is As public key ?
ii) If user B has private key =12, What is Bs public key ?
iii) What is the shared secret key
8. Explain any three communication methods, using Hash function with neat diagram.
9. Illustrate how keys are distributed between the users, using public key authority
service.
10. Define the elliptic curve over . Also write the corresponding addition formula.
11. Distinguish between conventional and public key encryption methods.
12. In a public key system using RSA, the cipher text received is C=10. With a public key
{e=5, n=35}, deduce the plaintext. Verify the answer by encryption process.
13. With the help of a block diagram, explain the process of public key exchange with the
help of certificate authority.
14. What is a hash function? What are the basic uses of a hash function?
15. Perform encryption and decryption using RSA algorithm for p=3, q=11, e=7 and m=5
16. Explain the different techniques proposed for the distribution of public keys.
17. Define Abelian group.

UNIT-4 DIGITAL SIGNATURES


1. What is a digital signature? What are its requirements?
2. Compare direct digital signatures and arbitrated digital signatures.
3. Explain singing and verifying functions of DSA

4. Explain arbitrated digital signature technique.


5. Explain the different categories of digital signature.
6. Compare RSA and DSS approach
7. Illustrate Replay attack by giving example
8. List and explain the three general approaches to deal with replay attacks.
9. Define classes of message authentication functions
10. Write a note on digital signature schemes.
11. What are some threats associated with a direct digital signature scheme?
12. What is a suppress- replay attack?
13. Write a note on digital signature standard.
14. Briefly explain Digital Signature Algorithm(DSA)
15. Write short notes on Mutual Authentication.

UNIT- 5 WEB SECURITY


1.
2.
3.
a)
4.
5.
6.
7.
8.
9.

Briefly explain SET requirements


Explain the various phases of SSL handshake protocol with a diagram.
Explain in detail the following transactions supported by SET
Purchase request b) Payment authorization.
Explain SSL protocol stack
What is the difference between SSL connection and SSL session?
Describe the purchase of Dual signature.
Mention the key features of SET.
Describe the sequence of events that are required for a transaction in SET.
List the different types of threats and consequences when using the web. Also list the
counter measures to be taken.
10. What is the need of dual signature in SET? Describe with block diagram how they are
constructed.
11. Discuss SSL record protocol interms of fragmentation, compression and encryption.
12. Give a brief comparison of threats on the web.
13. What are the challenges presented by the Web, in the context of computer and network
security.
14. Write a brief note on Web traffic Security Approaches.
15. Explain Alert protocol with a neat diagram

1.
2.
3.
4.
5.
6.
7.

UNIT-6- INTRUDERS
Explain the architecture of a distributed intrusion detection system. Give the major
issues in the design
Briefly explain the UNIX password scheme. What are the threats to this scheme? How
are they overcome?
Give examples of metrics that are useful for profile based intrusion detection.
Briefly describe the three classes of intruder.
Explain the password selection strategies in detail? Compare their relative merits.
With a schematic, explain the typical steps in digital immune system.
Write short notes on (i) Rule based intrusion detection (ii) Statistical anomaly detection

8. What are the two common techniques used to protect a password file?
9. List and briefly define four techniques used to avoid guessable passwords
10. What is a salt in the context of UNIX password management?
11. Briefly explain honey pots.
12. With a schematic explain the loading of a new password.
13. Explain Audit Records
14. Write a note on the vulnerability of passwords.

UNIT 7- MALICIOUS SOFTWARE


1. Give the taxonomy of malicious programs and explain them in brief.
2. List and explain the various virus countermeasures
3. What is a malicious program? List out the different types of viruses and explain them
4. Write a short note on Zombie
5. Briefly describe the most significant types of virus.
6. What is DDoS? Describe the three lines of defence against DDoS stacks
7. List the monitored behaviors of programs, a typical behavior blocking software does.
8. Write short note on Secure electronic transaction.
9. Discuss Email viruses.
10. Explain the typical phases of operation of a virus or worm.
11. In general terms, how does a worm propagate?
12. Briefly describe, advanced antivirus techniques
13. Write a note on Macro Viruses
14. What is the role of encryption in the operation of a virus?

UNIT 8- FIREWALLS
1.
2.
3.
4.

What is a firewall? Explain different types of firewall configuration


With neat diagrams, briefly explain the types of firewalls
With a neat diagram, explain the concept of trusted systems
With reference to the concept of trusted system explain (i) Multilevel security
requirements(ii) Reference monitor functionality
5. List the design goals of firewall
6. Explain briefly about trusted systems
7. Enumerate the capabilities and limitations of firewalls
8. With a neat diagram, explain the working of a packet filtering router
9. Discuss the concept of reference monitor with diagram. List the security rules of
reference monitor
10. Write a note on screened subnet firewall
11. Give the common characteristics of bastion host
12. In the context of access control, what is the difference between a subject and an object?
13. What is the difference between an access control list and a capability ticket?
14. What is the difference between a packet- filtering router and a stateful inspection
firewall?
15. Explain briefly about Trojan horse Defense.

Literature:
Book Type

Code

Author & Title

Text Book

TB

Cryptography and
William Stalling,

References

RB1

Cryptography and Network


Behrouz A. Forouzan,

References

RB2

Network

Security,

Publication info
Edition
&
Publisher
Pearson
Education, 2003.

Security,

Cryptography and Network Security, Atul


Kahate,

ISBN #
81-203-2385-8

TMH, 2007.

978-0-07-0660465

TMH, 2003.

81-203-1278-3

Note: From time to time, assignments will be posted on


https://sites.google.com/a/cmrit.ac.in/harsha_bk/

S-ar putea să vă placă și