Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester
Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester
Unit 1:
1 Briefly explain any two active security attacks.
2 Discuss the following terms in brief:
- brute force attack - cryptography
3 Discuss the following terms in brief. - authentication - data integrity
4 Explain playfair cipher substitution technique in detail. Find out cipher
text for the following given key and plaintext. Key =
ENGINEERING Plaintext=COMPUTER
5 Write differences between substitution techniques and transposition
techniques.
6 What is symmetric key cryptography? What are the challenges of
symmetric key cryptography? List out various symmetric key algorithms
and explain Caesar cipher in detail.
7 Explain one time Pad in detail. What are the practical issues of this
algorithm?
8 What is symmetric key cryptography? What are the challenges of
symmetric key cryptography? List out various symmetric key algorithms
and explain Caesar cipher in detail.
9 Write a short note on “Hill Cipher”.
10 Explain data confidentiality, data authentication and data integrity.
11 Describe mono alphabetic cipher.
12 Explain playfair cipher with example.
13 Explain one time pad cipher with example.
Explain one time Pad in detail. What are the practical issues of this
algorithm?
14 Explain columnar transposition Cipher technique
15 Differentiate block cipher and a stream cipher
16 Encrypt the Message “Surgical Strike” with key “GUJAR” using
PLAYFAIR technique.
17 Distinguish between Symmetric encryption and Asymmetric encryption
using suitable example.
18 Describe the term: Authentication, Authorization, Integrity and Non –
repudiation.
19 Encrypt the message "meet me at the usual place " using the Hill cipher
with the key 9 4
5 7
20 Explain Different type of Attacks on Crypto System.
21 Explain PGP with its Authentication and Confidentiality Operation.
22
Given key K= and plaintext =”ney”. Find out the
ciphertext applying Hill Cipher. Is Hill cipher strong against ciphertext
only attack or known plaintext attack? Justify the answer.
23 How cryptanalyst can exploit the regularities of the language? How
digrams can solve this problem? Use the key “hidden” and encrypt the
message “Message” using playfair cipher
24 Explain the rail fence cipher. Why a pure transposition cipher is easily
recognized?
25 What is the difference between a mono alphabetic cipher
and a polyalphabetic cipher?
26 Encrypt the message “GTU Examination”
using the Hill cipher algorithm with the key matrix
Show your
calculations and the result.
27 Perform encryption in Playfair Cipher algorithm with plain text as
“INFORMATION AND NETWORK SECURITY”, Keyword is
“MONARCHY”. (Note: 1.Put j and i both combine as a single field in 5*5
matrix).
Unit 2:
1 Explain single round of DES algorithm. Support your answer with neat
sketches.
2 Elaborate AES encryption & decryption with neat sketches.
3 Explain Byte substitution and Shift row operation of AES in detail.
4 Explain DES key generation process in detail
5 Explain avalanche effect in DES and discuss strength of DES in brief.
6 Describe various steps of AES.
7 Explain counter mode of DES operation.
8 Explain Byte substitution and Shift row operation of AES in detail.
9 Explain the VERNAM Cypher method.
10 Explain the difference between diffusion and confusion.
11 List out the various web security threats
12 What is meant by message digest? Give an example.
13 Explain how DES(Data Encryption standard) algorithm observes Fiestel
structure. Explain key generation and use of S-box in DES algorithm.
14 Briefly describe Mix Columns and Add Round Key in AES algorithm
Unit 3:
1 Explain triple DES with two keys.
2 Discuss Electronic code book and cipher feedback mode with neat
diagrams.
3 Write a short note on DES.
4 Explain double and triple DES.
5 Explain cipher feedback mode of DES operation.
6 Explain DES key generation process in detail.
7 Discuss in detail encryption and decryption process of DES.
8 (i) Explain working of ECB. Why ECB (Electronic code book) is rarely
used to encrypt message?
(ii) Why CFB(Cipher feedback mode) encrypted messages are less
subject to tampering than OFB(Output feedback mode)?
9 Explain the three approaches to attack RSA mathematically.
10 How meet in the middle attack is performed on double DES?
11 Explain CFB algorithm mode with diagram.
Unit 7:
1 Explain any one approach to Digital Signatures.
2 Write a short note on “Digital Signature Algorithm”.
3 What is digital signature? Explain hash code base digital signature.
4 Explain DSA (Digital Signature Algorithm).
5 Explain digital signature schemes Elgamal and Schnorr
6 Draw Generic Model of Digital Signature
Process
Unit 8:
1 Explain various general categories of schemes for the distribution of
public keys.
2 Write a note on : X.509 Certificate Format.
3 Explain digital public key certificate format.
4 Explain various public key distribution techniques.
5 Write a short note on SSL.
6 Write a short note on public key infrastructure.
7 Described briefly the Authentication process covered by X.509
8 Explain HAND SHAKE protocol in SSL.
Unit 9:
1 Write a detailed note on : Kerberos.
2 What is Kerberos? How Kerberos authenticates the users for authorized
service access?
3 Explain authentication mechanism of Kerberos.
4 What problem was Kerberos designed to address?
4 Unit 10:
5 Discuss SSL architecture in brief.
6 Briefly explain web security threats.
7 What is SSL? Which security services does it offers? How does it
works?
8 Write a short note on:
i. Cipher text only attack
ii. Timing attack
9 What is SSH? How does SSH works?
10 What is KDC? List the duties of a KDC
11 For what purpose Secure Shell (SSH) is useful? Briefly define SSH
protocol.
12 What is the main difference between HTTP and HTTPS protocol. When
HTTPS is used, which elements of the communication are Encrypted?