0% found this document useful (0 votes)
53 views2 pages

NSC-Interview Questions-NetGear

The document covers various aspects of cryptography and network security, including definitions, mechanisms, and services related to computer security, as well as detailed explanations of different ciphers and cryptographic algorithms. It also discusses key exchange methods, digital signatures, message authentication codes, and security protocols like IP Security and S/MIME. Additionally, it highlights the advantages and disadvantages of specific algorithms, security threats in wireless networks, and the requirements for public key cryptosystems.

Uploaded by

lopezloyla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

NSC-Interview Questions-NetGear

The document covers various aspects of cryptography and network security, including definitions, mechanisms, and services related to computer security, as well as detailed explanations of different ciphers and cryptographic algorithms. It also discusses key exchange methods, digital signatures, message authentication codes, and security protocols like IP Security and S/MIME. Additionally, it highlights the advantages and disadvantages of specific algorithms, security threats in wireless networks, and the requirements for public key cryptosystems.

Uploaded by

lopezloyla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CRYPTOGRAPHY AND NETWORK SECURITY

1 Define computer security. Explain CIA Triad along with two additional concepts which forms the essential requirements of computer security
2 Explain in detail the following wrt OSI security archictecture a.mechanisms b.services c.attacks
3 Explain any three substitution ciphers
4 Explain any two transposition ciphers
5 Explain CRT with an example.
6 With diagram explain stream cipher and block cipher
7 With diagram explain the elements of symmetric key and public key cryptosystem
8 With neat diagram explain the structure of DES and AES
9 Explain in detail with diagram the various functions used in AES
10 What are the advantages and disadvantages of DES algorithm
Differentite between a) public key and private key b)confusion and diffusion c)symmetric and publickey cryptosystem
11 d)mono alphabetic and poly alphabetic ciphers e)cryptanalysis and brute force attack f) double DES and triple DES

12 Wrtite short notes on a) Rotor machines b) Steganogrpahy


13 With respect to publickey cryptosystem explain the requirements and applications.
14 Write the steps of RSA agorithm and encrypt the message M='GCU' considering suitable values of p and q
15 What is Diffie Hellman key exchange algorithm. write the steps and find the public key of both users A and B considering suitable values of q and alpha
16 Explain the encryption and decryption process of elagamal cryptosystem
17 What is elliptic curve cryptography. Write the steps to encrypt and decrypt using elliptic curve cryptography and also Find all the points on the curve for the given E17(1,2).
18 Explain pseudo random number generator wrt to public key cryptography
19 Describe message authentication code with diagram and Explain the following wrt message authentication codes a)Brute force attack b)various types of attacks
20 Explain data authentication algorithm (DAA) for message authentication code
21 What is Digital signature. Explain the properties and requirements of digital signature
22 What is SHA . Explain SHA 3 algorithm and sponge construction
23 Differentiate between SHA-1 SHA-3 and SHA-512
24 What is KDC. Explain Decentralized key control with diagram.
25 Write short notes on the following a)KERBEROS b)X.509 certificates
26 What are the various techniques that are available for distribution of public keys
27 Explain Transposrt layer security architecture with diagram
28 Explain in detail the requirements and applications of IP Security.
29 Write showrt notes on a) DNS sec
30 Explain sender policy framework wrt sender side and receiver side
31 List the services of IP security
32 Explain the components and protocols wrt Electronic mail
33 Summarize the services provided by S/MIME
34 Write short notes on a)HTTPS b)SSH
35 List the various security threats in wireless networks.

You might also like