Académique Documents
Professionnel Documents
Culture Documents
SECTION - I
Conventional Encryptio n & Techniques
Web Security
37. Find and draw the relative location of following security facilities in the TCP/IP Protocol stack:
a. IP/IPsec
b. SSL or TLS
c. PGP
d. S/MIME
e. SET
38. What protocols comprise SSL?
39. List and briefly define the parameters that define an SSL session states.
40. List and briefly define the parameters that define an SSL session connection.
41. What is SSL Record Protocol? Explain two services provided for SSL connections by this protocol.
42. Explain SSL Handshake protocol.
43. Compare TLS and SSL.
44. What is SET? Briefly explain key features of it.
45. List and briefly define the principal categories of SET participants.
46. What is dual signature and what is its purpose in SET?
47. List out different SET transaction types.
48. What is firewall? List design goals (principles) for firewall.
49. Write short note on Trusted systems
50. List out different types of firewall and explain any one type of firewall.
R.K.COLLEGE OF ENGINEERING AND TECHNOLOGY
B.E. 6TH SEMESTER(CE)
INFORMATION SECURITY
ASSIGN MEN T/QUESTION BANK
SECTION – II
Number Theo ry
51. Explain the Euclid’s Algorithm to find out Greatest Common Divisor of two positive integers.
52. Discuss Euler’s Theorem with example.
1. What do you mean by Authentication? List and explain various Authentication Requirements.
2. What do you mean by Authenticator? Explain various types of functions used to produce an
authenticator.
3. What is MAC? Explain in detail.
4. Discuss various uses of Hash function.
5. Differentiate Message Authentication Code and Hash Function.
6. Discuss various properties that Hash function.
Network Security
1. What is Digital Signature? How it is superior to Message Authentication? Explain with example.
2. Discuss various properties that Digital Signature must have.
3. Discuss Direct Digital Signature and Arbitrated Digital Signature.
4. Discuss Mutual Authentication and one-way Authentication.
5. Explain RSA and DSS approaches to Digital Signature.
6. Discuss Digital Signature Algorithm.
7. Discuss Kerberos authentication service.
8. Explain format of X.509 certificate with various elements.