Vous êtes sur la page 1sur 3

R.K.

COLLEGE OF ENGINEERING AND TECHNOLOGY


B.E. 6TH SEMESTER(CE)
INFORMATION SECURITY
QUESTION BANK

SECTION - I
Conventional Encryptio n & Techniques

1. Draw and explain the Conventional Encryption Model.


2. Draw and explain the Conventional Cryptosystem Model.
3. Explain different cryptographic techniques.
4. Define following terms:
a. Cryptanalyst
b. Cryptanalysis.
5. List various possible attacks on encrypted messages.
6. Write short note on Rotor machine.
7. Define Steganography and explain various techniques for steganography.
8. What is the difference between monoalphabetic cipher and polyalphabetic cipher.
9. Explain following classical ciphers with example
a. Caesar Cipher
b. Hill Cipher
c. PlayFair Cipher
10. Explain Simplified DES with diagram
11. Differentiate block ciphers and stream ciphers.
12. Explain Fiestel Structure with diagram
13. List the design elements of Fiestel Structure.
14. Differentiate following terms:
a. Confusion
b. Diffusion.
15. Draw and explain the DES Algorithms
16. Draw and explain the Single round of DES Algorithms
17. Define following terms:
a. Linear Cryptanalysis
b. Differential Cryptanalysis
18. Explain block cipher design principles.
19. Explain with diagram for following Block cipher modes of operations
a. ECB,
b. CBC,
c. CFB,
d. OFB
20. Explain with diagram: TDEA
21. Explain following algorithms
a. Blowfish,
b. Rc5,
c. Cast-128,
d. Rc2
22. Explain traffic confidentiality.
23. Explain automatic key distribution for connection oriented protocol.
24. Explain various sources of random number generation and also illustrate properties of random
numbers.
25. Explain pseudorandom number generation.
R.K.COLLEGE OF ENGINEERING AND TECHNOLOGY
B.E. 6TH SEMESTER(CE)
INFORMATION SECURITY
ASSIGN MEN T/QUESTION BANK
IP Security E-Mail Security

26. What is IPSec? Draw the architecture of it.

27. Give examples of applications of IPSec.


28. What services are provided by IPSec?
29. Explain authentication header of IPSec.
30. What is ESP? Explain the header format for ESP.
31. What are the basic approaches to building SAs?
32. What is the different between transport mode and tunnel mode?
33. What are the five principal services provided by PGP?
34. How does PGP use the concept of trust?
35. Write short note on MIME.
36. What is S/MIME and list out and briefly explain the functionality provided by it.

Web Security

37. Find and draw the relative location of following security facilities in the TCP/IP Protocol stack:
a. IP/IPsec
b. SSL or TLS
c. PGP
d. S/MIME
e. SET
38. What protocols comprise SSL?
39. List and briefly define the parameters that define an SSL session states.
40. List and briefly define the parameters that define an SSL session connection.
41. What is SSL Record Protocol? Explain two services provided for SSL connections by this protocol.
42. Explain SSL Handshake protocol.
43. Compare TLS and SSL.
44. What is SET? Briefly explain key features of it.
45. List and briefly define the principal categories of SET participants.
46. What is dual signature and what is its purpose in SET?
47. List out different SET transaction types.
48. What is firewall? List design goals (principles) for firewall.
49. Write short note on Trusted systems
50. List out different types of firewall and explain any one type of firewall.
R.K.COLLEGE OF ENGINEERING AND TECHNOLOGY
B.E. 6TH SEMESTER(CE)
INFORMATION SECURITY
ASSIGN MEN T/QUESTION BANK

SECTION – II
Number Theo ry

51. Explain the Euclid’s Algorithm to find out Greatest Common Divisor of two positive integers.
52. Discuss Euler’s Theorem with example.

Public Key Crypto graphy

1. Explain Public-Key Cryptosystem with various ingredients.


2. Differentiate Conventional Encryption and Public-Key Encryption.
3. Discuss implementation of Public-Key Cryptosystem for secrecy.
4. Discuss implementation of Public-Key Cryptosystem for Authentication.
5. Discuss implementation of Public-Key Cryptosystem for secrecy and Authentication.
6. Discuss vulnerability of Public Key Encryption scheme.
7. Explain most widely accepted and implemented algorithm for PKC.
8. List and discuss various approaches for attacking RSA algorithm.

Message Authentication and Hash Function

1. What do you mean by Authentication? List and explain various Authentication Requirements.
2. What do you mean by Authenticator? Explain various types of functions used to produce an
authenticator.
3. What is MAC? Explain in detail.
4. Discuss various uses of Hash function.
5. Differentiate Message Authentication Code and Hash Function.
6. Discuss various properties that Hash function.

Network Security

1. What is Digital Signature? How it is superior to Message Authentication? Explain with example.
2. Discuss various properties that Digital Signature must have.
3. Discuss Direct Digital Signature and Arbitrated Digital Signature.
4. Discuss Mutual Authentication and one-way Authentication.
5. Explain RSA and DSS approaches to Digital Signature.
6. Discuss Digital Signature Algorithm.
7. Discuss Kerberos authentication service.
8. Explain format of X.509 certificate with various elements.

Vous aimerez peut-être aussi