0% found this document useful (0 votes)
17 views

Information & Network Security

Uploaded by

k20pro9t4
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Information & Network Security

Uploaded by

k20pro9t4
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Unit 1

1. Explain the architecture of OSI security.


2. Describe the Security Requirements Triad.
3. Explain the CIA Triad.
4. Define attacks. Explain its types.
5. Explain Passive attacks in detail.
6. What are active attacks?
7. What are X.800 Security Services?
8. What are various Security mechanisms available?
9. Explain X.800 Security mechanism in detail.
10. Explain Symmetric Cipher Model.
11. Explain Principles of Public-Key Cryptosystems.
12. Explain Substitution Techniques in detail.
13. Write a short note on Play fair cipher.
14. Explain Mono-Alphabetic Cipher with an example.
15. Explain Transposition Techniques.
16. Write a short note on Steganography.
17. Describe the Feistel Structure of Encryption & Decryption.
18. Explain Data Encryption Standard (DES) in detail.
19. Explain Triple DES in detail.
20. Explain AES Encryption & Decryption in detail.
21. Write a short note on the Electronic Code Book (ECB).
22. Explain cipher block chaining & cipher feedback mode.
23. What are the different modes of operation in DES?
24. Explain RSA algorithm in detail.
25. Perform encryption and decryption using RSA Algorithm for the following: P=17;
q=11; e=7; M=88.
26. Perform encryption and decryption using RSA Algorithm for the following: P=7;
q=11; e=17; M=8.
27. List the parameters for the three AES versions.
Unit 2

1. Explain Diffie-Hellman Key Exchange.


2. Explain Public-Key Cryptosystems.
3. User A & B exchange the key using Diffie Hellman algorithm. Assume α=5\alpha =
5α=5, q=11q = 11q=11, XA=2X_A = 2XA=2, XB=3X_B = 3XB=3. Find YAY_AYA
, YBY_BYB, KKK.
4. User Alice & Bob exchange the key using Diffie Hellman algorithm. Assume α=5\
alpha = 5α=5, q=83q = 83q=83, XA=6X_A = 6XA=6, XB=10X_B = 10XB=10. Find
YAY_AYA, YBY_BYB, KKK.
5. Explain the use of Hash function.
6. State various applications of Cryptographic Hash Functions.
7. What is known as Message Authentication Codes (MAC)?
8. Write a short note on MD5 algorithm.
9. Explain the Secure Hash Algorithm (SHA) in detail.
10. What do you mean by Digital Signatures?
11. Describe the Generic Model of Digital Signature process.
12. Explain the two approaches of Digital Signatures.
13. Describe a simple key distribution scenario in detail.
14. Explain Public Key Distribution scenario in detail.
15. Describe X.509 Certificate format.
16. Explain PKIX Architectural Model.
17. Explain Public Key Infrastructure in detail.
18. Explain Kerberos in detail.
19. Describe the working of Kerberos in depth.

Unit 3
1. What are Firewalls? Explain the Types of Firewalls.
2. Explain Secure Electronic Transaction.
3. Explain Intrusion Detection systems.
4. Explain SSL in detail.
5. Explain Firewall Design Principles.
6. Explain the importance of web security.
7. Explain Viruses and threats.
8. Explain DDOS.
9. Write a short note on PGP.
10. Write a short note on S/MIME.
11. Explain IP Security Architecture.
12. What is encapsulating security payload in IP Security?
13. Discuss web security considerations.
14. Write a short note on Secure Socket Layer.
15. Write in brief about Transport Layer Security.
16. Differentiate between IDS & IPS.
17. What are the types of Intrusion Detection systems?
18. What is Malicious Mobile Code?
19. Define Virus. State its types of Viruses.
20. Write a short note on Honeypots.

You might also like