0% found this document useful (1 vote)
217 views3 pages

Cns Cryptography and Network Security Important Questions

Uploaded by

msuniquee22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
217 views3 pages

Cns Cryptography and Network Security Important Questions

Uploaded by

msuniquee22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CRYPTOGRAPHY AND NETWORK SECURITY IMPORTANT

QUESTIONS

UNIT -1 :

1) What Is Meant By Security Attack? What Are Various Types Of


Security Attacks?
2) Write About SecurityMechanisms.
3) Explain About SecurityServices.
4) Explain About Network Security Model With A Neat Diagram.
5) What Are The Basics Of Cryptography? Explain About Symmetric
Cipher Model With A
Neat Diagram.
6) What Are The Basic Building Blocks Of Encryption Techniques?
Explain.
7) What are the Design Principles Of Block Cipher?

UNIT -2 :

1) Explain About DES With A Neat Diagram.


2) Explain About Various Modes Of Operations With Neat Diagrams.
3) Explain About AES.
4) Explain About IDEA And Triple DES.
5) Write About Key Expansion In Blowfish.
6) Number Theory all Algorithems (WE CANT EXPECT WHICH
ALGORITHM WILL BE GIVEN IN EXAM)

UNIT -3

1)WHAT IS A PUBLIC KEY CRYPTOGRAPHY ALGORITHM IN DETAIL .


2)WHAT IS NIST Digital Signature Algorithm
3)WHAT IS A HASH FUNCTION ? EXPLAIN HMAC AND CMAC
4)EXPLAIN IN DETAIL ABOUT DIFFIE HELLMAN KEY EXCHANGE
5)WHAT ARE THE APPLICATIONS OF CRYPTOGRAPHY HASH
FUNCTIONS
6)WHAT IS A MESSAGE AUTHENTICATION ? EXPLAIN DIFFERENT
MESSAGE AUTHENTICATION FUNCTIONS
7)EXPLAIN RAS ALGORITHM

UNIT - 4

1) WHAT IS AUTHENTICATION . EXPLAIN THE PRINCIPLES OF


REMOTE USER AUTHENTICATION
2)explain electronic mail security (we have only 2 max 2 will be asked
so read 2 securitys)
3)expalin ip security architecture
4)what is payload expalin the process of encapsulatiog security
payload
5)explin Combining Security Associations and Key Management
UNIT -5

1)EXPLAIN THE REQUIREMENTS OF WEB SECURITY


2)EXPLAIN SSL AND TLS LAYERS
3)WHAT IS A FIREWALL.EXPLAIN THE TYPES AND PLACEMENTS OF
FIREWALLS
4)EXPLAIN THE FIREWALL CONFIGURATION
5)WHAT IS TRUSTED SYSTEMS

You might also like