B.
Tech IV/I NETWORK SECURITY & CRYPTOGRAPHY
Assignment Questions
UNIT-I
1. Explain Principle of Security.
2. Explain Substitutions techniques.
3. Explain Transposition techniques.
4. What is threat? Explain different types of threats.
5. Difference b/w symmetric and asymmetric key cryptography.
6. What is cryptography and steganography?
7. Define security attack. Explain various types of attacks.
8. Explain different types of Security services.
9. Explain different types of Security mechanisms.
10. Explain network security model with neat diagram.
11. Explain buffer overflow vulnerability and format string vulnerability.
12. Explain TCP and UDP session hijacking.
UNIT-II
1) Explain principle of block cipher
2) What is triple encryption? Explain 3DES and its application.
3) Explain difference between block cipher and stream cipher.
4) Explain Key Distribution in Symmetric key encryption algorithm
5) Explain DES algorithm.
6) Explain AES algorithm.
7) Explain cipher block modes of operations.
8) Explain difference between AES and DES.
9) Explain fiestel cipher structure.
10) Explain RC4 algorithm.
11) Explain Diffie-Hellman key exchange algorithm.
12) Explain requirements of authentication.
13) Explain about one way hash function.
14) Explain about message authentication code(MAC).
15) Explain Secure Hash Algorithm(SHA).
16) Explain about HMAC
UNIT-III
1. Explain Euclid's algorithms.
2. Explain Euler's & Fermat’s theorem.
3. Explain Chinese remainder theorem.
4. Explain RSA algorithm with example.
5. Explain principle of public key cryptography.
6. Write a short note on digital signature and its approaches. Explain digital signature
algorithm.
7. Write a short note on public key infrastructure.
8. Explain Kerberos.
9. Explain X.509 authentication services.
UNIT-IV
1. Explain about Pretty Good Privacy (PGP).
2. Explain about S/MIME.
3. Explain about IP Security architecture and its header format.
4. Explain IP Security authentication header (AH) and Encapsulation security payload
(ESP).
5. Explain different protocols used in IP Security .Explain Combing Security Association
and key Management Techniques.
UNIT-V
1. Explain requirements of web security.
2. Explain Secure Socket Layer (SSL) and Transport Layer Security (TLS).
3. Explain Secure Electronic Transaction (SET).
4. Explain about Intrusion Detection system with neat diagram.
5. Explain about Trusted systems.
6. Explain different password management strategies.
7. What is virus? Explain different types of viruses and its counter measures.
8. What is firewall? Explain designing goals of firewall.
9. Explain types of firewalls and firewall configuration.
10. What is a worm? Explain types of worms.
Objective type questions
1. Which security measures are needed to protect data during their transmission
A) Computer B) Network C) Internet D) All
2. Which security mechanism enforces access rights to the resources
A) Authentication Exchange B) Security Label C) Access Control D) Data
Integrity
3. Symmetric block cipher consists of a sequence of rounds, with each round perform
A) Substitutions B) Permutations C) Both D) None
4. Which mode is used to convert any block cipher into a stream cipher
A) ECB mode B) CBC mode C) CTR mode D) CFB mode
5. How many rounds are there in SHA-512 Algorithm
A) 80 B) 79 C) 60 D) 64
6. Hash function with the property that for any given block x, it is computationally
infeasible to find y≠ x with H(y) = H(x) is.
A) Collision resistant B) Second preimage resistant C) Preimage resistant D) None
7. Application supported by RSA algorithm is
A) Digital signature B) Encryption/decryption C) Key exchange D) All
[Link] AS creates a ticket that contain
A) User’s ID B) Network address C) Server’s ID D) All
[Link] of the following is PGP service
A) Digital signature B) Message encryption C) Both A&B D) None
[Link] transfer encoding is useful when the data consists largely of octets that
correspond toprintable ASCII characters
A) Quoted-Printable B) Binary C) Base64 D) X-Token
1._________________ involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
2. ___________________ protects data from unauthorized disclosure.
3. ____________________ prevents either sender or receiver from denying a transmitted
message.
4. ___________________ is the original message or data that is fed into the algorithm as input.
5. Length of the plain text processed in DES algorithm is __________________ bits.
6. AES stands for_____________________.
7. In RSA encryption algorithm Cipher text C= ____________________.
8. In key exchange application two sides cooperate to exchange a ________________.
9. __________________ field indicates the extent to which PGP will trust that this is a valid
public key for the user.
10. S/MIME stands for _____________________________.