Sunteți pe pagina 1din 6

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

EC E14 CRYPTOGRAPHY AND NETWORK SECURITY


(IV Year /VII Sem)
Question Bank
Unit-I

PART A

1. Define cryptography?
2. What are the types of security threats?
3. Define security attacks and mention its classification?
4. What are the classification of passive attacks
5. What are the classification of active attacks
6. Distinguish passive attack from active attack with reference to X.800.
7. What is traffic analysis?
8. What type of information might be derived from a traffic analysis attack?
9. What is meant by security service? Give its classification
10. What is meant by non-repudiation? How does this help the users?
11. What is meant by authentication? Give its classification
12. What is meant by data integrity and data confidentiality
13. What is meant by spread spectrum techniques
14. What are the classification of spread spectrum techniques
15. Define Processing Gain
16. Distinguish slow and fast frequency hop spread spectrum
17. Define CDMA
18. What are the applications of CDMA.

PART B

1. With a neat block diagram explain network security model and associated parameter with
it
2. Explain OSI security architecture along with the services available. Or
3. Describe security services with its categories
4. List and briefly define categories of passive and active security attacks
5. Briefly explain categories of security mechanism
6. Explain Direct sequence spread spectrum technique
7. Explain frequency hop spread spectrum techniques
8. Explain CDMA with Rake receiver
9. Describe generation of PN sequence and state it properties.
Unit-II

PART A

1. State the requirements of conventional cryptography


2. What is meant by computationally secure encryption scheme?
3. Differentiate between Block and stream ciphering schemes.
4. What are the two basic functions used in encryption algorithm
5. Define substitution and transposition
6. Point out types of cryptanalytic attacks
7. What difference is between conditionally secured and unconditionally secured?
8. What are two problems with the one time pad?
9. What is product cipher
10. What is linear and differential cryptanalysis?
11. What are the essential ingredients of a symmetric cipher
12. Give the rules for encrypting a plain text using playfair cipher.
13. Give the rules for encrypting a plain text using Hill cipher.
14. What is Steganography?
15. Is it possible to use DES algorithm to generate message authentic code? Justify.
16. Explain the avalanche effect.
17. What is meant by avalanche effect in DES algorithm
18. State few applications of RC4 algorithm

PART B

1. Discuss in detail about classical encryption


2. Explain substitution encryption techniques in detail
3. Discuss the following
a. Polyalphabetic cipher
b. Playfair cipher
c. Monoalphabetic chipher
4. Write briefly about security services? With example explain about Ceaser cipher and
transposition cipher
5. Discuss in detail the following
a. Rotor machines
b. Important design consideration for stream cipher
6. How simplified DES scheme is used for encryption and decryption
7. Explain in detail key generation in AES algorithm and its expansion format
UNIT III
PART A

1. What is asymmetric encryption


2. State the principles of public key cryptosystems.
3. How does Diffie-Hellman key exchange achieve security
4. What are elliptic curve cryptosystems?
5. List the steps taken during key exchange between two users using elliptic curves
6. Mention any two technique of attacking RSA
7. Define hash function
8. What are the applications of cryptographic hash functions
9. State the security requirements of cryptographic hash functions
10. What is message authentication
11. What is message authentication code
12. What are the functions of a hash function used in message authentication
13. What is the difference between message authentication code and one way hash function
14. Compare MD4 and MD5.
15. List three approaches to secure user authentication in a distributed environment
16. State properties of digital signature
17. Compare SHA-1 and MD5 algorithm
18. What are digital signature standards

PART B

1. Explain public key cryptosystems


2. Describe in detail RSA algorithm, highlighting its computational aspects and security.
3. Explain Diffie hellman key exchange with an example
4. Explain elliptic curve cryptography.
5. Explain the authentication requirements and its functions.
6. Describe the message digest algorithm.
7. Explain in detail the different authentication protocols
8. Explain the various characteristics of hash function
9. Explain digital signature scheme
10. Explain digital signature standards

UNIT IV

PART A

1. Why network needs security?


2. Specify the basic task for defining a security service.
3. What are the function areas of IP security?

4. Give the application of IP security.

5. Specify the IP security services.

6. Give IPSEC ESP Format.

7. How IPSec does offer the authentication and confidentiality services?

8. What are the services provided by PGP services?

9. What are the security options PGP allows when sending an email message?

10. Why the leading two octets of message digest are stored in PGP message along with
encrypted message digest?

11. Draw the general format for PGP message.

12. What is X.509 Standard?

13. What is the role of Ticket Granting Server in inter realm operations of Kerberos?

14. Mention the scenario where Kerberos scheme is preferred.

15. What are the technical deficiencies in the Kerberos version 4 protocols?

16. Define S/MIME.

17. What are the key algorithms used in S/MIME?

18. What are the headers fields define in MIME?

19. What is meant by SET? What are the features of SET?

20. What are the steps involved in SS L required protocol?


21. Draw the header format for an ISAKMP message.

22. What is man in the middle attack?

23. What do you mean by Reply Attack?

PART B

1. Explain in detail the architecture of IPSec


2. Illustrate the various fields of authentication header with their architecture.
3. Explain in detail about web security considerations.
4. Explain secure socket layer and transport layer security
5. Write short notes on the following
i)IP security architecture
ii)Secure electronic transaction
6. Write in detail about electronic transaction
7. What is meant by secure electronic transaction? Explain services provided along with the
features of secure electronic transaction.
8. Explain in detail bout e-mail security.
9. What is PGP? Write brief notes.
UNIT V

PART A

1. What is an intruder?
2. What is intrusion detection system?
3. Define password protection.
4. What is malicious program?
5. What is a virus?
6. What is a worm?
7. What is a trojan horse?
8. Who is a masquerader and clandestine user?
9. What is meant by a trusted system?
10. What is a firewall?

PART B
1. Describe briefly about intrusion detection methods.
2. Define intrusion detection and different types of detection mechanism in detail
3. Explain the architecture of distributed intrusion detection in detail
4. Comment on the password selection strategies and their significance.
5. How will you enhance the ability of a system to defend against intruders and malicious
programs
6. List various virus counter measures.
7. Write short notes on worms and viruses.
8. Write short notes on threats
9. Explain the firewall design principles
10. Write short notes on firewall
11. Explain firewalls and how they prevent instruction
12. When system administrator trusts the internal users, what type of firewall is to used?
What are its limitations and how can these difficulties be overcome?
13. Describe about firewall design principle in detail
14. Write the important steps involved in the design of firewalls

S-ar putea să vă placă și