Vous êtes sur la page 1sur 3

PART B : QUESTIONS

UNIT I
1. Explain in detail about classical encryption techniques. 16
2. Explain about substitution and transposition techniques with examples. 16
3. Problems in classical encryption techniques like ceaser, mono alphabetic and
play fair ciphers. 16
4. Explain about Feistel cipher structure 8
5. What is stegnography 8
6. Explain about Block cipher design principles 8
7. Explain about Block cipher modes of operation 8
8. Explain Data Encryption Standard (DES) in detail. 16
9. Explain in detail about S-DES (simplified DES) 16
10. Explain in detail about Triple DES with their advantages 16
11. How AES is used for encryption / decryption process? Discuss with
example. 16
12. List the evaluation criteria defined by NIST for AES 16

UNIT II
1. Explain in detail about RSA Algorithm and highlight its computational
aspects with security. 16
2. RSA Problems:
i. Perform decryption and encryption using RSA algorithm with
p=3;q=11;e=7 and N=5.
ii. Discuss RSA with computations for public key cryptography. Also
perform the Encryption and decryption for p=7 , q = 11, e = 17 and m =
8
iii. Perform encryption and decryption using the RSA algorithm for the
following:
a. p= 3; q= 11, e= 7; M= 5
b. p= 5; q= 11, e= 3; M= 9

iv. Summarize RSA Algorithm. Perform Key Generation for the prime
numbers 17 and 11 and perform Encryption and Decryption for the
plaintext input of 88.

3. Briefly explain Diffie Hellman Key exchange with an example
4. Problem:
Users A and B want to establish a secret key using Diffie - Hellman key
exchange protocol using a common prime q= 353, a primitive root = 3,
As secret key XA=97 and Bs secret key XB=233. Compute
i. As public key, YA
ii. Bs public key, YB
iii. As and Bs common secret key, K

5. Explain in detail about Elliptic curve crypto system. 16
6. Explain how the Elliptic curves are useful in cryptography. 16
7. Define Fermat theorem and explain its application.
8. Define Eulers theorem and explain its application.
9. Define Chinese remainder theorem and explain its application.
10. Explain the Key management of public key encryption in detail
11. Explain in detail about public key cryptography
12. Explain about traffic confidentiality in symmetric encryption.
UNIT III
1. Explain authentication functions in detail.
2. Explain in detail about MAC and its applications
3. Explain Hash Function
What is meant by message digest? Give an example.
4. Explain MD5 in detail
5. Explain HMAC in detail
Briefly explain Digital Signature algorithm
6. Explain Digital Signature Standard
7. Discuss clearly Secure Hash Algorithm
8. Explain RIPEMD in detail
9. Explain SHA 1 in detail
10. Compare the performance of MD5 , SHA 1, RIPEMD

UNIT IV
1. What is kerberos? Explain how it provides authenticated service?
2. Explain in detail about Kerberos.
3. Explain in detail about X.509 Authentication procedure.
4. Explain about Email Security
5. Explain about S/MIME
6. Explain about PGP
7. Explain the architecture of IPSEC.
8. Write about authentication header and ESP
9. Explain handshake protocol actions of SSL.
10. Explain in detail the Secure Socket Layer with its Architecture.
Discuss in detail Secure Electronic Transaction (SET).
11. List out the participants of the SET system in detail.

UNIT V
1. Explain the types of Intrusion detection systems
2. Write about trusted systems in detail
3. Explain the different types of firewall and its configuration in detail.
4. Define Viruses and explain the types in details
5. Explain in detail about password management

Vous aimerez peut-être aussi