0% found this document useful (0 votes)
15 views3 pages

Ac & Is QB Updated

Uploaded by

rahulgattadi458
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

Ac & Is QB Updated

Uploaded by

rahulgattadi458
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

School of

Engineering
(CSE-CYBERSECURITY)
II Year B. Tech - I Semester
Subject Name: Applied Cryptography and Information Security
Subject Code: MR23-1CS0402
Question Bank
Q.no Questio Marks Section
n
1 Explain Confidentiality, Integrity and Availability wit 8 Section-I
h example?
2 Explain security mechanisms with neat diagrams? 8 Section-I
3 Define the term Authentication and its types, authorization 8 Section-I
and Non-repudiation with example?
4 Define Caesar cipher? And calculate the encryption and 8 Section-I
decryption for the plain text P=”COME TO MY HOME” by
using caser cipher with Key k=3?
5 Categorize active attacks and passive attacks? 8 Section-I
6 Explain Hill cipher encryption and decryption with an 8 Section-I
Example?
7 Define Hash Function? Explain Hashing Methods in 8 Section-I
detail?
8 Explain Digital Signature. Write some Application areas of 8 Section-I
Digital Signatures in Real-World?
9 Explain substitution Techniques with an 8 Section-I
examples?
10 Explain Transposition Techniques with an 8 Section-I
examples?
11 What is Symmetric and Asymmetric Encryption Algorithm? 8 Section-II
Explain Block cipher and Stream cipher with examples.
12 Explain the encryption and decryption process of DES 8 Section-II
algorithm ?
13 Describe the Creation of keys in Advanced Encryption 8 Section-II
Standard (AES) Algorithm. Explain the encryption and
decryption process of AES algorithm using 128-bits keys.

14 Explain the RSA Algorithm in cryptography with its 8 Section-II


characteristics.

15 Explain the Diffi-Hellmen key Exchange algorithm with an 8 Section-II


Example?
16 Explain with a neat diagram about Cipher Block Chaining 8 Section-II
in block cipher and list out its advantages and
disadvantages?
17 Discuss Block and Stream Ciphers as types of symmetric 8 Section-II
encryption?
18 Explain Advanced Encryption Standard (AES) Algorithm? 8 Section-II
19 Explain about Esoteric Protocol Elliptic Curve Cryptography 8 Section-II
with a neat Diagram?
20 Explain Holomorphic Encryption Algorithm with example 8 Section-II
and its applications?
21 What is Cryptographic Hash Function? Explain with 8 Section-III
suitable example.
22 Explain the Authentication Standards – Kerberos with 8 Section-III
suitable diagram.
23 Explain Hash functions based on Cipher Block Chaining 8 Section-III
(CBC) with c.
24 Why we need for MAC based on Hash Functions (HMAC) 8 Section-III
in cryptography.
25 Describe the Secured Hash (SHA) Function 8 Section-III
and
its applications in details
26 Write short notes on “Application of Hashing in Password 8 Section-III
Storage” with suitable example.
27 Explain Message Digest (MD5) Algorithm Round Function 8 Section-III
in detail.
28 Illustrate PKI Trust Models in detail with Examples. 8 Section-III
29 Explain Kerberos in Authentication Standards 8 Section-III
30 Describe Security Handshake Drawbacks. 8 Section-III
31 Describe Lucifer and Madryga Algorithm with neat 8 Section-IV
Diagram?
32 Explain the 3-Way cryptographic algorithm with encryption 8 Section-IV
and decryption ?
33 Describe the GOST algorithm with Sub keys in Different 8 Section-IV
Rounds
34 Clarify the CRAB and Rivest Cipher 5(RC5) cryptographic 8 Section-IV
algorithm
35 Illustrate Double Encryption (2-DES) and Triple Encryption 8 Section-IV
(3-DES) with suitable diagram.
36 Write a short notes on CDMF Key Shortening and 8 Section-IV
Whitening
37 Write a short notes on New DES Cryptographic Algorithm 8 Section-IV
38 Describe key management techniques like CDMF Key 8 Section-IV
Shortening and Whitening, explaining how they enhance
security in encryption systems.
39 Examine multiple encryption schemes like Triple DES and 8 Section-IV
Double Encryption.
40 Discuss the Lucifer cipher and its role as a precursor to 8 Section-IV
DES.
41 What is a smart card? How Do Smart Cards Work? How 8 Section-V
you can use smart card in E-passport and ID cards.
42 What is Mobile Device Security and why it is important in 8 Section-V
cyber security?
43 Explain secure payment System with example. What Is 8 Section-V
Bitcoin and How Does it work?
44 Explain Pohlig–Hellman Algorithm with example 8 Section-V
45 Illustrate Elliptic-curve cryptography/cryptosystem with 8 Section-V
suitable example.
46 Write a short notes on SDA/DDA/CDA Bank Cards 8 Section-V
47 Write a short notes on McEliece cryptosystem 8 Section-V
48 Discuss the functioning of a secure payment system using 8 Section-V
a specific example
49 Define Bitcoin? How does Bitcoin function and what exactly 8 Section-V
is it?
50 Define Mobile Device Security. Explain Components of 8 Section-V
mobile device security.

You might also like