0% found this document useful (0 votes)
39 views1 page

Question Bank

computer engineering question bank

Uploaded by

Aries Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views1 page

Question Bank

computer engineering question bank

Uploaded by

Aries Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Pacific School Of Engineering, Surat

Question Bank Of Information Security

1) What is security mechanism? List and explain various security mechanism.


2) Explain various types of attack on computer mechanism.
3) What attacks can be done on encrypted text? Explain them. Or Explain various cryptanalysis
attack.
4) What is security services? Explain types of security services.
5) Explain Substitution(casercipher,playfair,Hill,monoalphabetic,polyalphabetic(viginear),
onetime pad(vernam) and Transportation Techniques(Rail fence, Column Rectangular
transformation) with example.
6) Explain feistal structure with encryption and Decryption.
7) List and explain various block cipher modes of operation with the help of diagram.
8) Explain DES algorithm. Also discuss Strength and weakness of DES.
9) Explain double and triple DES.
10) Explain AES algorithm with key expansion.
11) Explain key distribution with proper diagram.
12) Explain various ways for distribution of public key.
13) State the difference between Symmetric encryption and asymmetric encryption Also
Explain Model of both.
14) Explain RSA algorithm with possible attacks and example.
15) Explain Diffie Hellman key exchange algorithm with example.
16) Explain Authentication Functions. (Encryption (Message Authentication, Message
Confidentiality), Message Authentication Code (MAC), Hash Function with its requirement
and applications).
17) Explain SHA-512.
18) Explain HMAC.
19) What is Digital Signature? Explain types of Digital Signature. Explain DSA(Digital Signature
Algorithm) as well Elgamal and Schnorr standards.
20) Explain Kerberos in detail.
21) Discuss X.509 Certificates.

Prepared By :-
Hiral Desai

You might also like