The document is a question bank for the Information and Network Security course at Silver Oak College of Engineering and Technology for B.E Semester VII. It includes assignments covering various topics such as encryption methods, security threats, cryptographic algorithms, and digital signatures, with specific questions from past exams. The document also provides instructions for students regarding the completion of assignments and the use of acronyms related to the subject matter.
The document is a question bank for the Information and Network Security course at Silver Oak College of Engineering and Technology for B.E Semester VII. It includes assignments covering various topics such as encryption methods, security threats, cryptographic algorithms, and digital signatures, with specific questions from past exams. The document also provides instructions for students regarding the completion of assignments and the use of acronyms related to the subject matter.
SILVER OAK COLLEGE OF ENGINEERING AND TECHNOLOGY, AHMEDABAD
AFFILIATED TO GUJARAT TECHNOLOGICAL UNIVERSITY
2170709 – INFORMATION AND NETWORK SECURITY QUESTION BANK
Prepared for: B.E Semester VII Division: ALL
Subject Faculty Name: Prof. Stebin Sebastian Academic Year: 2018-19
Instructions for students:
I. The assignment question bank contains questions asked in Summer-2017, Winter-2016, Winter-2016 (Old), Summer-2016, Winter 2015, Summer 2015, Winter 2014, Summer 2014, Winter 2013, Summer 2013, Winter 2012, Nov-2011, May-2012, May-2011, II. Students has to write all the questions mentioned in each assignments. No any question is allowed to be skipped during writing. III. Chapter numbers in brackets () indicates that particular which assignment contains questions from which chapters. IV. Acronyms used: (1) PT = Plain text, Message, (2) CT = Cipher text, cipher (3) MAC = Message authentication code (4) HMAC = Hash- keyed Message Authentication Code (5) AES = Advanced Encryption Standard, Rijndael (6) DES = Data Encryption Standard (7) C,A,I,N = Confidentiality, Authentication, Integrity, Non-Repudiation (8) RSA= Ron Rivest, Adi Shamir, and Leonard Adleman (9) KDC = Key Distribution Center (10) MD5 = Message Digest algo. Version 5 (11) SHA = Secure Hash Algorithm Version-X (12) TGS = Ticket Granting Server
1) Encrypt the following message using playfair cipher, (Explain process of generation of encryption matrix) (i). Message: “Tall trees” Key: “Occurrence” (ii). Message: “Come to the window” Key: “Keyword” 2) Explain data confidentiality, data authentication and data integrity 2 4 5 9 4 3) Do encryption using Hill cipher: (i) Message = "DEF" and key = [9 2 1] (ii) Message = "Exam" and key = [ ] 3 8 7 5 7 4) What is the difference between passive and active security threats? List and briefly define categories of passive and active security attacks. 5) Define the term cryptanalysis. Explain various types of cryptanalytic attacks. Explain Byte substitution and Shift row operation of AES in detail. 1) What is the purpose of the S-boxes in DES? 2) Explain single round of DES algorithm
Assignment 2 (Chapters Included: 3,4)
1) What is the limitation of Electronic Codebook Mode (ECB)? How it is overcome by Cipher Block Chaining (CBC) mode? Also explain CBC mode in detail. 2) Why is it important to study the Feistel cipher? Explain feistel cipher 3) Define the term – confusion, diffusion. 4) P and Q are two prime numbers. P=7, and Q=17. Take public key E=5. If plain text value is 6, then what will be cipher text value according to RSA algorithm? Explain in detail. 5) Explain Diffie - Hellman key exchange algorithm(Limitations, Man-in-Middle attack) 6) Compare Public Key cryptography (Asymmetric Key Cryptography) Vs. Private key Cryptography (Symmetric Key cryptography)
Assignment 3 : (Chapters Included: 5,6)
1) What characteristics are needed in secure hash function? Explain the concept of simple hash function. 2) Write MD5 algorithm. 3) Write a short note on Message Authentication Code (MAC) & HMAC 4) How message authentication code can be used to achieve message authentication and confidentiality?
Assignment 4: (Chapters Included: 7,8)
1) Write a short note on “Digital Signature Algorithm”. (services provided by digital signature) 2) What is the purpose of X.509 standard? 3) Explain various general categories of schemes for the distribution of public keys. 4) What is the purpose of X.509 standard?
Assignment 5: (Chapters Included: 9,10)
1) What is Kerberos? How Kerberos authenticates the users for authorized service access? (four requirements of Kerberos, TGS) 2) What is SSL? Which security services does it offers? How does it works?(architecture, SSL session & connection and their parameters, Handshake) 3) Explain the use of firewall.