IS - ASSINGMENT-UNIT-1 To UNIT-IV

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

VIDHYADEEP UNIVERSITY

VIDHYADEEP INSTITUTE OF
ENGINEERINGAND TECHNOLOGY
Vidhyadeep Campus, Anita (Kim), Ta. Olpad, Dist. Surat

Subject Name: Information security Code: 3170720/002304775 Sem: 7th

Assignment:-1 Unit-I,II,III,IV

1. List and explain different types of attacks.


2. Explain Caesar cipher algorithm with the help of example.
3. List and explain different mode of operation used for encryption and decryption.
4. Explain with example any two principles of Security
5. Define the following terms related to Information Security:
i Cryptography ii. Cryptanalysis iii. Sniffing iv. Spoofing v. Interception
vi. Fabrication vii. Masquerade
6. Explain Substitution technique with the help of example.
7. Difference between Symmetric and Asymmetric key cryptography
8. Explain Data Encryption standard (DES) with example.
9. Write steps for sub key generation in DES
10. Difference between Stream ciphers and block ciphers.
11. Explain AES with structure.
12. Explain Electronic Code Book and Cipher Block Chaining Mode in detail.
13. Discuss Cipher Feedback (CFB) block cipher modes of operation with the help of
diagram.
14. Discuss Cipher Block Chaining (CBC) modes of operation with the help of diagram.
15. In a Diffie-Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and
primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is the secret
key they exchanged? Explain it with proper steps.
16. Differentiate between Symmetric key cryptography and Asymmetric key cryptography.
17. Explain RSA algorithm with example in detail.
18. List the requirements of public key cryptography.
19. List application of RSA algorithm.
20. Discuss security of Diffie Hellman Key exchange algorithm with the help of example.
21. Using diagram explain how RSA algorithm can be used to digitally sign the message.
22. Compute public key and private key of RSA with p-11, q=17 and e = 7.

Subject Coordinator H.O.D. (COMP)

PREPARED BY:
COMPUTER ENGINEERING
DEPARTMENT
PROF. BABLI MISHRA 1

You might also like