0% found this document useful (0 votes)
81 views3 pages

Shree Swaminarayan Institute of Technology, Bhat: Computer Engineering Department Subject: Information Security (3170720)

This document contains a question bank with questions from 6 units of an Information Security course. The units cover topics like active security attacks, symmetric and asymmetric encryption algorithms like DES, AES, RSA, Diffie-Hellman, and cryptographic hash functions. Some questions ask to explain encryption algorithms like DES and AES steps, encryption modes like ECB and CBC, digital signatures and authentication. Other questions involve applying algorithms to examples or finding keys and ciphertexts.

Uploaded by

Herry Maheta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views3 pages

Shree Swaminarayan Institute of Technology, Bhat: Computer Engineering Department Subject: Information Security (3170720)

This document contains a question bank with questions from 6 units of an Information Security course. The units cover topics like active security attacks, symmetric and asymmetric encryption algorithms like DES, AES, RSA, Diffie-Hellman, and cryptographic hash functions. Some questions ask to explain encryption algorithms like DES and AES steps, encryption modes like ECB and CBC, digital signatures and authentication. Other questions involve applying algorithms to examples or finding keys and ciphertexts.

Uploaded by

Herry Maheta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Shree Swaminarayan Institute of Technology, Bhat

Computer Engineering Department


Subject: Information Security (3170720)
Semester-7th
QUESTION BANK
UNIT 1

1. Briefly explain any two active security attacks.

2. Explain data confidentiality, data authentication and data integrity.

3. Describe mono alphabetic cipher.

4. Explain playfair cipher with example.

5. Explain one time pad cipher with example.

6. Discuss the following terms in brief:


A) brute force attack
B) cryptography
7. Explain playfair cipher substitution technique in detail.
Find out cipher text for the following given key and plaintext.
Key = ENGINEERING
Plaintext=COMPUTER
8. Write differences between substitution techniques and transposition techniques.
9. Construct a Playfair matrix with the key “engineering”. And encrypt the message
“impossible”.
10. Define Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem.
11. Write a note on Hill Cipher.
12. Using the Vigenère cipher, encrypt the word “ATTACKATDAWN” using the key “LEMON”.
13. What is symmetric key cryptography? What are the challenges of symmetric key
cryptography? List out various symmetric key algorithms and explain Caesar cipher in
detail.
14. Describe the term: Authentication, Authorization, Integrity and Non – repudiation.

UNIT 2

1. Explain single round of DES algorithm. Support your answer with neat sketches.

2. Write a short note on DES.


3. Explain the key generation in DES algorithm.

4. Describe various steps of AES. Or Elaborate AES encryption with neat sketches.

5. Explain four different stages of AES(Advance Encryption standard) structure.

6. Distinguish between Symmetric encryption and Asymmetric encryption using suitable


example.

UNIT 3

1. Discuss Electronic code book and cipher feedback mode with neat diagrams.

2. Explain triple DES with two keys.

3. Explain double and triple DES.

4. Explain working of ECB.Why ECB (Electronic code book) is rarely used to encrypt
message?

5. Explain cipher feedback mode of DES operation.

6. Explain Cipher Block Chaining (CBC) and Electronic Code Book (ECB) block cipher
modes of operation with the help of diagram.

UNIT 4

1. Explain RSA algorithm in detail with suitable example. In a public key cryptosystem
using RSA algorithm, user uses two prime numbers 5 and 7. He chooses 11 as
Encryption key , find out decryption key. What will be the ciphertext, if the plaintext
is 2?

2. In a public key system using RSA, the cipher text intercepted is C=10 which is sent to
the user whose public key is e=5, n=35. What is the plaintext M?

1. Discuss Diffie-Hillman key exchange algorithm in detail.

2. For Diffie-Hellman algorithm, two publicaly known numbers are prime number 353
and primitive root of it is 3. A selects the random integer 97 and B selects 233.
Compute the public key of A and B. Also compute common secret key.

3. Explain man in middle attack in Diffie Hellman key exchange.

UNIT 5

4. Write requirements for hash function and briefly explain simple hash function.

5. Explain basic Hash code generation


6. Discuss the following terms in brief.

- authentication

- data integrity

7. Give differences between hash function and message authentication codes.

8. What is digital signature? Explain hash code base digital signature.

UNIT 6

1. Write a note on : Message Authentication Codes.

2. Explain HMAC algorithm.

You might also like