We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Pacific School Of Engineering, Surat
Question Bank Of Information Security
1) What is security mechanism? List and explain various security mechanism.
2) Explain various types of attack on computer mechanism. 3) What attacks can be done on encrypted text? Explain them. Or Explain various cryptanalysis attack. 4) What is security services? Explain types of security services. 5) Explain Substitution(casercipher,playfair,Hill,monoalphabetic,polyalphabetic(viginear), onetime pad(vernam) and Transportation Techniques(Rail fence, Column Rectangular transformation) with example. 6) Explain feistal structure with encryption and Decryption. 7) List and explain various block cipher modes of operation with the help of diagram. 8) Explain DES algorithm. Also discuss Strength and weakness of DES. 9) Explain double and triple DES. 10) Explain AES algorithm with key expansion. 11) Explain key distribution with proper diagram. 12) Explain various ways for distribution of public key. 13) State the difference between Symmetric encryption and asymmetric encryption Also Explain Model of both. 14) Explain RSA algorithm with possible attacks and example. 15) Explain Diffie Hellman key exchange algorithm with example. 16) Explain Authentication Functions. (Encryption (Message Authentication, Message Confidentiality), Message Authentication Code (MAC), Hash Function with its requirement and applications). 17) Explain SHA-512. 18) Explain HMAC. 19) What is Digital Signature? Explain types of Digital Signature. Explain DSA(Digital Signature Algorithm) as well Elgamal and Schnorr standards. 20) Explain Kerberos in detail. 21) Discuss X.509 Certificates.
Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE): - A comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, Graph-Theory, Routing and the change from Mix-Networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol