Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Similar documents
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Cryptography and Network Security

10EC832: NETWORK SECURITY

BCA III Network security and Cryptography Examination-2016 Model Paper 1

(2½ hours) Total Marks: 75

Cryptography MIS

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

APNIC elearning: Cryptography Basics

KALASALINGAM UNIVERSITY

Study Guide to Mideterm Exam

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CSC/ECE 774 Advanced Network Security

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Introduction to information Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

14. Internet Security (J. Kurose)

SRI VENKATESWARA COLLEGE OF ENGINEERING

Cryptography and Network Security

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

WAP Security. Helsinki University of Technology S Security of Communication Protocols

CSC 774 Network Security

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Security: Focus of Control. Authentication

Encryption. INST 346, Section 0201 April 3, 2018

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

David Wetherall, with some slides from Radia Perlman s security lectures.

Chapter 8 Web Security

MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY

Security: Focus of Control

E-commerce security: SSL/TLS, SET and others. 4.1

Network Security. Chapter 8. MYcsvtu Notes.

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Network Security Chapter 8

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Cryptography and Network Security

Security. Communication security. System Security

CRYPTOGRAPHY AND NETWORK SECURITY

Computer Security: Principles and Practice

T Cryptography and Data Security

Introduction to Cryptography. Vasil Slavov William Jewell College

Cryptographic Concepts

CSCE 715: Network Systems Security

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Sirindhorn International Institute of Technology Thammasat University

Name of chapter & details.

Public Key Cryptography

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Verteilte Systeme (Distributed Systems)

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Pretty Good Privacy (PGP

Information Security: Principles and Practice Second Edition. Mark Stamp

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Basics of Cryptography

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Lecture 6 - Cryptography

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

MLR Institute of Technology

CS 356 Internet Security Protocols. Fall 2013

What did we talk about last time? Public key cryptography A little number theory

Chapter 6/8. IP Security

Public Key Cryptography

Information Security CS 526

Introduction and Overview. Why CSCI 454/554?

EEC-682/782 Computer Networks I

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Transport Level Security

Cryptography (Overview)

CSCE 715: Network Systems Security

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

Chettinad College of Engineering and technology, Karur Department DEPARTMENT of Information OF ECETechnology Cryptography and Network Security Two

Internet and Intranet Protocols and Applications

T Cryptography and Data Security

1.264 Lecture 28. Cryptography: Asymmetric keys

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Babu Madhav Institute of Information Technology, UTU 2016

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

VPN Overview. VPN Types

Transcription:

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional Encryption 1. Define the terms threat and attack. List and briefly define categories of security attacks. 2. List and briefly define the security services. 3. What is security mechanism? List and explain various security mechanism. 4. Define the Cryptography. 5. Differentiate Symmetric and Asymmetric key cryptography. 6. Write the differences between conventional encryption and public key encryption. 7. Compare public key and private key cryptography. Also list various algorithms for each. 8. What is public key cryptography? Compare public it with conventional cryptography. 9. What is cryptography? Briefly explain the model of Asymmetric Cryptosystem. 10. Define Cryptography and Cryptanalysis. Draw and explain conventional cryptosystem. 11. Explain cryptanalysis. Discuss any one technique for it 12. Explain the conventional security model used for information security. 13. What is the objective of attacking an encryption system? Write the two approaches to attack a conventional encryption scheme. 14. Explain the terms diffusion and confusion. 15. List and explain various types of attacks on encrypted message. 16. Define the Caesar cipher. 17. Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair matrix with the key moonmission and encrypt the message greet. 18. Explain the various types of cryptanalytic attack, based on the amount of information known to the cryptanalyst. 19. Explain play fair cipher with suitable example. 20. Construct 5 X 5 playfair matrix for the keyword OCCURANCE. 21. Let the keyword in playfail cipher is keyword. Encrypt a message come to the window using playfair cipher. 22. Construct a Playfair matrix with the key engineering. And encrypt the message test this process. 23. Construct a playfair matrix with the key occurrence. Generate the cipher text for the plaintext Tall trees. 24. Encrypt the message Good morning using the Hill Cipher with the key 25. Write short note on: Hill Cipher BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 1

26. Explain the one time pad scheme. 27. Explain Vegenere Cipher. 28. Explain monoalphabetic cipher and polyalphabetic cipher by giving an example. 29. Explain various types of attack on computer system. Unit-2: Conventional Encryption Techniques: 1. Draw and explain Feistel s structure for encryption and decryption. 2. Define Block Cipher. Explain Design Principles of block cipher. 3. The exact realization of Feistel network depends on the choice of which parameters? 4. Explain DES algorithm with Figure. 5. Explain single round function of DES with suitable diagram. 6. Explain limitation of DES in detail. 7. Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain the avalanche effect in DES. 8. Explain the triple DES scheme with two keys and write about proposed attacks on 3DES. 9. Explain how sub-keys are generated in blowfish algorithm and also explain the encryption in blowfish algorithm. How does the key-size in blowfish differ from cast 128? 10. Explain Sub key generation Process in Simplified DES algorithm with Example. 11. Explain Blowfish encryption algorithm. 12. Draw and explain single blowfish round in detail. 13. Describe the three operations used by International Data Encryption Algorithm. 14. What is the difference between fiestel structure of Blowfish and cast-128? Explain the fiestel structure of Blowfish and cast-128. 15. List various modes of operations of block cipher. Explain any three of them briefly. 16. List and explain various block cipher modes of operation with the help of diagram. 17. Why mode of operation is defined? Explain the simplest mode for block cipher modes of operation? 18. Why mode of operation is defined? Explain the block cipher modes of operation? 19. Explain Modes of Operations. 20. Which two criteria are used to validate that a sequence of numbers is random? Explain the linear congruential method to generate pseudorandom numbers. 21. What is a pseudorandom number? Selection of which values are critical in developing a good linear congruential generatos. Unit-3: Public Key Cryptography 1. List and explain four general categories of schemes for the distribution of public keys. 2. List and explain various key management techniques. 3. Explain different key distribution techniques. 4. Write the key distribution scenario in which each user shares a unique master key with key distribution centre. 5. What is KDC? With the help of diagram explain how KDC do key distribution. 6. Explain the key distribution scenario and write how does decentralized key control work? BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 2

7. Discuss the ways in which public keys can be distributed to two communication parties. 8. What is a nonce in key distribution scenario? Explain the key distribution scenario if A wishes to establish logical connection with B. A and B both have a master key which they share with itself and key distribution canter. 9. Give the steps of RSA algorithm. 10. Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on RSA. 11. Define the types of cryptanalytic attacks. Which cryptanalytic attack can occur on RSA algorithm? 12. Write four possible approaches to attacking the RSA algorithm. 13. Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, M=5. 14. In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is the plaintext M? 15. Calculate ciphertext in case of RSA if p=3,q=11,e=3,m=5. 16. How key exchange using elliptic curves can be done? 17. Write short note on:elliptic Curve Cryptography 18. What is an elliptic curve? What is the zero point of an elliptic curve? 19. What is primitive root? Explain Diffi-Hellmen key exchange algorithm with proper example. 20. Explain Deffie Hellman key exchange scheme in detail. 21. Write Diffie Hellman key exchange algorithm. Explain man-in-the middle attack on this Diffie Hellman key exchange. 22. Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle attack? Justify. Unit-4: Number Theory 1. Write extended Euclidean algorithm. 2. Define Relative Prime Number. 3. Explain Euler s totient function. 4. Find all primitive roots of a number 7. 5. Write two properties of prime numbers. 6. With the help of example explain how can find out GCD of two numbers using Euclid algorithm. 7. Find GCD of 1970 and 1066 using Euclid algorithm 8. Define congruent modulo. Also Find integer x such that 1. 5x 4 (mod 3) 2. 7x 6 (mod 5) 9. Write the Euclid s algorithm and show the steps of Euclid s algorithm to find gcd (1970, 1066). Unit-5: Message Authentication and Hash Functions 1. Is message authentication code same as encryption? How message authentication can be done by message authentication code? 2. What characteristics are needed in a secure hash function? 3. Write short note on: Message Authentication Code 4. Explain MD5 Hash Algorithm. BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 3

5. Explain four passes of MD5 message digest algorithm. 6. Explain SHA512 Algorithm. 7. Explain the operation of secure hash algorithm on 512 bit block. 8. Write the note on Digital Signature Algorithm. 9. What is digital signature? Explain its use with the help of example. 10. List the security services provided by digital signature. Write and explain the Digital Signature Algorithm. 11. Illustrate variety of ways in which hash code can be used to provide message authentication. 12. Which parameters affect RC5 encryption algorithm. Explain RC5 encryption and decryption process. 13. Explain the general structure of secure hash functions. 14. Explain different characteristics of hash function. 15. Define MAC. 16. Explain briefly basic uses of MAC. 17. Illustrate the overall operation of HMAC. Define the terms. 18. What is MAC? Why it is required? Explain HMAC algorithm. 19. What is a trap-door one-way function? What is its importance in public key cryptography? 20. What is the difference between weak and strong collision resistance? 21. Explain the following properties of hash function (i) One way property, (ii) Weak collision resistance (iii) Compression function in hash algorithm. 22. What is cryptographic checksum or message authentication code? Describe the three situations in which message authentication code is used. Unit-6: Introduction to E-commerce 1. What are the security threats to E-commerce transactions? 2. Explain Security of E-Commerce. Unit-7: Network Security: 1. Define Digital Signature. 2. Explain X.509 authentication service. 3. Explain the one way and two way authentication in X.509. 4. Explain Kerberos in detail. 5. Explain the ticket granting server (TGS) scheme in Kerberos. 6. What problem was Kerberos designed to address? Briefly explain how session key is distributed in Kerberos. 7. Active Directory Service of Windows NT. 8. Explain Active Directory Services of Windows 2000 Server. Unit-8: IP Security E-Mail Security: 1. Explain modes of operations of IPsec and applications of IPsec. 2. What is the difference between transport mode and tunnel mode? 3. What parameters characterize the nature of a particular security association in IPSec. 4. What does authentication header provide in case of IP security? Explain the various fields in Authentication Header. BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 4

5. How encapsulating security payload help in IP security? Explain various fields in Encapsulating security payload packet. 6. Discuss about PGP and S/MIME. 7. Explain the functions provided by S/MIME. 8. What steps sending PGP (pretty good privacy) perform? Explain PGP message generation. 9. Explain the general format of PGP (Pretty Good Privacy) message. Assume that message is going from A to B. 10. Why is the segmentation and reassembly function in PGP (Pretty Good Privacy) needed? Unit-9: Web Security: 1. Explain SSL protocol in detail. 2. List and define the parameters that define secure socket layer connection state. 3. Which parameters define session state and which parameters define connection state in SSL (secure socket Layer). 4. Explain the pseudorandom function used by Transport layer security. 5. Explain the secure socket layer handshake protocol action. 6. Explain Secure electronic transaction protocol 7. Write the key features of secure electronic transaction. 8. What is dual signature and explain construction of dual signature. 9. What is a dual signature in reference to secure electronic transaction? 10. What is included in authorization request sent by merchant to the payment gateway in case of E-commerce transaction? 11. Which tasks are performed by payment gateway in E-commerce transaction? 12. Explain Firewall. 13. Explain packet filtering router in case of firewall. 14. What type of verification is provided by trusted system? 15. How can we achieve web security? Explain with example. *********** BE Sem VI (CE/IT), 160702 @ SPCE, Visnagar 5