Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional Encryption 1. Define the terms threat and attack. List and briefly define categories of security attacks. 2. List and briefly define the security services. 3. What is security mechanism? List and explain various security mechanism. 4. Define the Cryptography. 5. Differentiate Symmetric and Asymmetric key cryptography. 6. Write the differences between conventional encryption and public key encryption. 7. Compare public key and private key cryptography. Also list various algorithms for each. 8. What is public key cryptography? Compare public it with conventional cryptography. 9. What is cryptography? Briefly explain the model of Asymmetric Cryptosystem. 10. Define Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem. 11. Explain cryptanalysis. Discuss any one technique for it 12. Explain the conventional security model used for information security. 13. What is the objective of attacking an encryption system? Write the two approaches to attack a conventional encryption scheme. 14. Explain the terms diffusion and confusion. 15. List and explain various types of attacks on encrypted message. 16. Define the Caesar cipher. 17. Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair matrix with the key moonmission and encrypt the message greet. 18. Explain the various types of cryptanalytic attack, based on the amount of information known to the cryptanalyst. 19. Explain play fair cipher with suitable example. 20. Construct 5 X 5 playfair matrix for the keyword OCCURANCE. 21. Let the keyword in playfail cipher is keyword. Encrypt a message come to the window using playfair cipher. 22. Construct a Playfair matrix with the key engineering. And encrypt the message test this process. 23. Construct a playfair matrix with the key occurrence. Generate the cipher text for the plaintext Tall trees. 24. Encrypt the message Good morning using the Hill Cipher with the key 25. Write short note on: Hill Cipher BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 1
26. Explain the one time pad scheme. 27. Explain Vegenere Cipher. 28. Explain monoalphabetic cipher and polyalphabetic cipher by giving an example. 29. Explain various types of attack on computer system. Unit-2: Conventional Encryption Techniques: 1. Draw and explain Feistel s structure for encryption and decryption. 2. Define Block Cipher. Explain Design Principles of block cipher. 3. The exact realization of Feistel network depends on the choice of which parameters? 4. Explain DES algorithm with Figure. 5. Explain single round function of DES with suitable diagram. 6. Explain limitation of DES in detail. 7. Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain the avalanche effect in DES. 8. Explain the triple DES scheme with two keys and write about proposed attacks on 3DES. 9. Explain how sub-keys are generated in blowfish algorithm and also explain the encryption in blowfish algorithm. How does the key-size in blowfish differ from cast 128? 10. Explain Sub key generation Process in Simplified DES algorithm with Example. 11. Explain Blowfish encryption algorithm. 12. Draw and explain single blowfish round in detail. 13. Describe the three operations used by International Data Encryption Algorithm. 14. What is the difference between fiestel structure of Blowfish and cast-128? Explain the fiestel structure of Blowfish and cast-128. 15. List various modes of operations of block cipher. Explain any three of them briefly. 16. List and explain various block cipher modes of operation with the help of diagram. 17. Why mode of operation is defined? Explain the simplest mode for block cipher modes of operation? 18. Why mode of operation is defined? Explain the block cipher modes of operation? 19. Explain Modes of Operations. 20. Which two criteria are used to validate that a sequence of numbers is random? Explain the linear congruential method to generate pseudorandom numbers. 21. What is a pseudorandom number? Selection of which values are critical in developing a good linear congruential generatos. Unit-3: Public Key Cryptography 1. List and explain four general categories of schemes for the distribution of public keys. 2. List and explain various key management techniques. 3. Explain different key distribution techniques. 4. Write the key distribution scenario in which each user shares a unique master key with key distribution centre. 5. What is KDC? With the help of diagram explain how KDC do key distribution. 6. Explain the key distribution scenario and write how does decentralized key control work? BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 2
7. Discuss the ways in which public keys can be distributed to two communication parties. 8. What is a nonce in key distribution scenario? Explain the key distribution scenario if A wishes to establish logical connection with B. A and B both have a master key which they share with itself and key distribution canter. 9. Give the steps of RSA algorithm. 10. Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on RSA. 11. Define the types of cryptanalytic attacks. Which cryptanalytic attack can occur on RSA algorithm? 12. Write four possible approaches to attacking the RSA algorithm. 13. Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, M=5. 14. In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is the plaintext M? 15. Calculate ciphertext in case of RSA if p=3,q=11,e=3,m=5. 16. How key exchange using elliptic curves can be done? 17. Write short note on:elliptic Curve Cryptography 18. What is an elliptic curve? What is the zero point of an elliptic curve? 19. What is primitive root? Explain Diffi-Hellmen key exchange algorithm with proper example. 20. Explain Deffie Hellman key exchange scheme in detail. 21. Write Diffie Hellman key exchange algorithm. Explain man-in-the middle attack on this Diffie Hellman key exchange. 22. Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle attack? Justify. Unit-4: Number Theory 1. Write extended Euclidean algorithm. 2. Define Relative Prime Number. 3. Explain Euler s totient function. 4. Find all primitive roots of a number 7. 5. Write two properties of prime numbers. 6. With the help of example explain how can find out GCD of two numbers using Euclid algorithm. 7. Find GCD of 1970 and 1066 using Euclid algorithm 8. Define congruent modulo. Also Find integer x such that 1. 5x 4 (mod 3) 2. 7x 6 (mod 5) 9. Write the Euclid s algorithm and show the steps of Euclid s algorithm to find gcd (1970, 1066). Unit-5: Message Authentication and Hash Functions 1. Is message authentication code same as encryption? How message authentication can be done by message authentication code? 2. What characteristics are needed in a secure hash function? 3. Write short note on: Message Authentication Code 4. Explain MD5 Hash Algorithm. BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 3
5. Explain four passes of MD5 message digest algorithm. 6. Explain SHA512 Algorithm. 7. Explain the operation of secure hash algorithm on 512 bit block. 8. Write the note on Digital Signature Algorithm. 9. What is digital signature? Explain its use with the help of example. 10. List the security services provided by digital signature. Write and explain the Digital Signature Algorithm. 11. Illustrate variety of ways in which hash code can be used to provide message authentication. 12. Which parameters affect RC5 encryption algorithm. Explain RC5 encryption and decryption process. 13. Explain the general structure of secure hash functions. 14. Explain different characteristics of hash function. 15. Define MAC. 16. Explain briefly basic uses of MAC. 17. Illustrate the overall operation of HMAC. Define the terms. 18. What is MAC? Why it is required? Explain HMAC algorithm. 19. What is a trap-door one-way function? What is its importance in public key cryptography? 20. What is the difference between weak and strong collision resistance? 21. Explain the following properties of hash function (i) One way property, (ii) Weak collision resistance (iii) Compression function in hash algorithm. 22. What is cryptographic checksum or message authentication code? Describe the three situations in which message authentication code is used. Unit-6: Introduction to E-commerce 1. What are the security threats to E-commerce transactions? 2. Explain Security of E-Commerce. Unit-7: Network Security: 1. Define Digital Signature. 2. Explain X.509 authentication service. 3. Explain the one way and two way authentication in X.509. 4. Explain Kerberos in detail. 5. Explain the ticket granting server (TGS) scheme in Kerberos. 6. What problem was Kerberos designed to address? Briefly explain how session key is distributed in Kerberos. 7. Active Directory Service of Windows NT. 8. Explain Active Directory Services of Windows 2000 Server. Unit-8: IP Security E-Mail Security: 1. Explain modes of operations of IPsec and applications of IPsec. 2. What is the difference between transport mode and tunnel mode? 3. What parameters characterize the nature of a particular security association in IPSec. 4. What does authentication header provide in case of IP security? Explain the various fields in Authentication Header. BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 4
5. How encapsulating security payload help in IP security? Explain various fields in Encapsulating security payload packet. 6. Discuss about PGP and S/MIME. 7. Explain the functions provided by S/MIME. 8. What steps sending PGP (pretty good privacy) perform? Explain PGP message generation. 9. Explain the general format of PGP (Pretty Good Privacy) message. Assume that message is going from A to B. 10. Why is the segmentation and reassembly function in PGP (Pretty Good Privacy) needed? Unit-9: Web Security: 1. Explain SSL protocol in detail. 2. List and define the parameters that define secure socket layer connection state. 3. Which parameters define session state and which parameters define connection state in SSL (secure socket Layer). 4. Explain the pseudorandom function used by Transport layer security. 5. Explain the secure socket layer handshake protocol action. 6. Explain Secure electronic transaction protocol 7. Write the key features of secure electronic transaction. 8. What is dual signature and explain construction of dual signature. 9. What is a dual signature in reference to secure electronic transaction? 10. What is included in authorization request sent by merchant to the payment gateway in case of E-commerce transaction? 11. Which tasks are performed by payment gateway in E-commerce transaction? 12. Explain Firewall. 13. Explain packet filtering router in case of firewall. 14. What type of verification is provided by trusted system? 15. How can we achieve web security? Explain with example. *********** BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 5