0% found this document useful (0 votes)
1K views5 pages

Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester

This document contains a bank of questions related to the subject of information security. It is divided into 10 units that cover topics such as symmetric and asymmetric encryption algorithms like DES, AES, RSA, and Diffie-Hellman; cryptographic hash functions like MD5 and SHA; digital signatures; public key infrastructure; and network security protocols like SSL and Kerberos. Each unit contains around 10-15 questions asking students to explain, compare, differentiate or provide examples for the various cryptographic techniques and how they provide confidentiality, integrity and authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views5 pages

Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester

This document contains a bank of questions related to the subject of information security. It is divided into 10 units that cover topics such as symmetric and asymmetric encryption algorithms like DES, AES, RSA, and Diffie-Hellman; cryptographic hash functions like MD5 and SHA; digital signatures; public key infrastructure; and network security protocols like SSL and Kerberos. Each unit contains around 10-15 questions asking students to explain, compare, differentiate or provide examples for the various cryptographic techniques and how they provide confidentiality, integrity and authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Computer Engineering Department

GTU IMPORTANT QUESTIONS BANK

Subject Name : Information ecurity


Subject Code
Semester

Unit 1:
1 Briefly explain any two active security attacks.
2 Discuss the following terms in brief:
- brute force attack - cryptography
3 Discuss the following terms in brief. - authentication - data integrity
4 Explain playfair cipher substitution technique in detail. Find out cipher
text for the following given key and plaintext. Key =
ENGINEERING Plaintext=COMPUTER
5 Write differences between substitution techniques and transposition
techniques.
6 What is symmetric key cryptography? What are the challenges of
symmetric key cryptography? List out various symmetric key algorithms
and explain Caesar cipher in detail.
7 Explain one time Pad in detail. What are the practical issues of this
algorithm?
8 What is symmetric key cryptography? What are the challenges of
symmetric key cryptography? List out various symmetric key algorithms
and explain Caesar cipher in detail.
9 Write a short note on “Hill Cipher”.
10 Explain data confidentiality, data authentication and data integrity.
11 Describe mono alphabetic cipher.
12 Explain playfair cipher with example.
13 Explain one time pad cipher with example.
Explain one time Pad in detail. What are the practical issues of this
algorithm?
14 Explain columnar transposition Cipher technique
15 Differentiate block cipher and a stream cipher
16 Encrypt the Message “Surgical Strike” with key “GUJAR” using
PLAYFAIR technique.
17 Distinguish between Symmetric encryption and Asymmetric encryption
using suitable example.
18 Describe the term: Authentication, Authorization, Integrity and Non –
repudiation.
19 Encrypt the message "meet me at the usual place " using the Hill cipher
with the key 9 4
5 7
20 Explain Different type of Attacks on Crypto System.
21 Explain PGP with its Authentication and Confidentiality Operation.
22
Given key K= and plaintext =”ney”. Find out the
ciphertext applying Hill Cipher. Is Hill cipher strong against ciphertext
only attack or known plaintext attack? Justify the answer.
23 How cryptanalyst can exploit the regularities of the language? How
digrams can solve this problem? Use the key “hidden” and encrypt the
message “Message” using playfair cipher
24 Explain the rail fence cipher. Why a pure transposition cipher is easily
recognized?
25 What is the difference between a mono alphabetic cipher
and a polyalphabetic cipher?
26 Encrypt the message “GTU Examination”
using the Hill cipher algorithm with the key matrix

 
Show your
calculations and the result.
27 Perform encryption in Playfair Cipher algorithm with plain text as
“INFORMATION AND NETWORK SECURITY”, Keyword is
“MONARCHY”. (Note: 1.Put j and i both combine as a single field in 5*5
matrix).

Unit 2:
1 Explain single round of DES algorithm. Support your answer with neat
sketches.
2 Elaborate AES encryption & decryption with neat sketches.
3 Explain Byte substitution and Shift row operation of AES in detail.
4 Explain DES key generation process in detail
5 Explain avalanche effect in DES and discuss strength of DES in brief.
6 Describe various steps of AES.
7 Explain counter mode of DES operation.
8 Explain Byte substitution and Shift row operation of AES in detail.
9 Explain the VERNAM Cypher method.
10 Explain the difference between diffusion and confusion.
11 List out the various web security threats
12 What is meant by message digest? Give an example.
13 Explain how DES(Data Encryption standard) algorithm observes Fiestel
structure. Explain key generation and use of S-box in DES algorithm.
14 Briefly describe Mix Columns and Add Round Key in AES algorithm

Unit 3:
1 Explain triple DES with two keys.
2 Discuss Electronic code book and cipher feedback mode with neat
diagrams.
3 Write a short note on DES.
4 Explain double and triple DES.
5 Explain cipher feedback mode of DES operation.
6 Explain DES key generation process in detail.
7 Discuss in detail encryption and decryption process of DES.
8 (i) Explain working of ECB. Why ECB (Electronic code book) is rarely
used to encrypt message?
(ii) Why CFB(Cipher feedback mode) encrypted messages are less
subject to tampering than OFB(Output feedback mode)?
9 Explain the three approaches to attack RSA mathematically.
10 How meet in the middle attack is performed on double DES?
11 Explain CFB algorithm mode with diagram.

12 Explain Counter (CTR) algorithm mode with


diagram
Unit 4:
1 Explain RSA algorithm in detail with suitable example.
2 Discuss Diffie-Hillman key exchange algorithm in detail.
3 What are the principal elements of public-key cryptosystem? Explain in
brief.
4 P and Q are two prime numbers. P=7, and Q=17. Take public key E=5.
If plain text value is 6, then what will be cipher text value according to
RSA algorithm? Explain in detail.
5 What is PKI? What are the components of PKI? Explain Certificate
Authority in detail.
6 Consider the scenario where user A wants to send bulk data (data is in
GBs) to user B using networking. Data exchange has to be done in
confidential manner. The key which is used for encryption can be
intercepted by an attacker. Which is the most efficient and protected
way to achieve secure communication? Justify your answer in detail.
7 Explain key pair generation using RSA algorithm
8 Explain encryption and decryption using RSA.
9 Explain Diffie Hellman key exchange algorithm.
10 Explain man in middle attack in Diffie Hellman key exchange
11 P and Q are two prime numbers. P=7, and Q=17. Take public key E=5.
If plain text value is 6, then what will be cipher text value according to
RSA algorithm? Explain in detail.
12 In a public key cryptosystem using RSA algorithm, user uses two prime
numbers 5 and 7. He chooses 11 as Encryption key , find out decryption
key. What will be the ciphertext , if the plaintext is 2?
13 For Diffie-Hellman algorithm, two publicaly known numbers are prime
number 353 and primitive root of it is 3. A selects the random integer
97 and B selects 233. Compute the public key of A and B. Also
compute common secret key
14 What is the difference between a session key and a master key? List
four general categories of schemes for the distribution of public keys.
Unit 5:
1 Write requirements for hash function and briefly explain simple hash
function.
2 Give differences between hash function and message authentication
codes.
3 “Only Hashing dose not ensures integrity of message in network
communication” – Justify your answer with suitable example.
4 Differentiate between hashing and encryption. What are the practical
applications of hashing? Compare MD5 and SHA1 hashing algorithms.
5 Explain HMAC algorithm.
6 Explain basic Hash code generation.
7 Explain HTTPS and SSH.
8 Discuss HASH function and its application in Crypto System.
9 Discuss clearly Secure Hash Algorithm with its real time application.
10 What is the difference between weak and strong collision resistance?
Consider the hash functions based on cipher block chaining, What kind
of attack can occur on this?
11 What is the role of a compression function in a hash function?

12 Explain working of Secure Hash Algorithm, with basic arithmetical and


logical functions used in SHA
Unit 6:
1 Write a note on : Message Authentication Codes
2 Explain MAC code generation using block cipher.
3 What is MAC ? How it useful in Crypto System.
4 Is a message authentication code (MAC) function is similar to
encryption. Does MAC provide authentication or confidentiality?
Justify your answer
5 What problem was Kerberos designed to address? What are the three
threats associated with user authentication over a network or Internet?
6 List three approaches to secure user authentication in a distributed
environment.
7 Describe MAC with its security implications

Unit 7:
1 Explain any one approach to Digital Signatures.
2 Write a short note on “Digital Signature Algorithm”.
3 What is digital signature? Explain hash code base digital signature.
4 Explain DSA (Digital Signature Algorithm).
5 Explain digital signature schemes Elgamal and Schnorr
6 Draw Generic Model of Digital Signature
Process
Unit 8:
1 Explain various general categories of schemes for the distribution of
public keys.
2 Write a note on : X.509 Certificate Format.
3 Explain digital public key certificate format.
4 Explain various public key distribution techniques.
5 Write a short note on SSL.
6 Write a short note on public key infrastructure.
7 Described briefly the Authentication process covered by X.509
8 Explain HAND SHAKE protocol in SSL.
Unit 9:
1 Write a detailed note on : Kerberos.
2 What is Kerberos? How Kerberos authenticates the users for authorized
service access?
3 Explain authentication mechanism of Kerberos.
4 What problem was Kerberos designed to address?
4 Unit 10:
5 Discuss SSL architecture in brief.
6 Briefly explain web security threats.
7 What is SSL? Which security services does it offers? How does it
works?
8 Write a short note on:
i. Cipher text only attack
ii. Timing attack
9 What is SSH? How does SSH works?
10 What is KDC? List the duties of a KDC
11 For what purpose Secure Shell (SSH) is useful? Briefly define SSH
protocol.
12 What is the main difference between HTTP and HTTPS protocol. When
HTTPS is used, which elements of the communication are Encrypted?

You might also like