0% found this document useful (0 votes)
71 views5 pages

Cryptography and Networks Question Bank

The document outlines a comprehensive curriculum on network security, covering various topics such as security threats, encryption methods, cryptographic algorithms, and security protocols. It includes detailed explanations of symmetric and asymmetric cryptography, hash functions, digital signatures, and security services. Additionally, it discusses practical applications like PGP, S/MIME, SSL, and IP security, along with their operational mechanisms and security features.

Uploaded by

likithadadi84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views5 pages

Cryptography and Networks Question Bank

The document outlines a comprehensive curriculum on network security, covering various topics such as security threats, encryption methods, cryptographic algorithms, and security protocols. It includes detailed explanations of symmetric and asymmetric cryptography, hash functions, digital signatures, and security services. Additionally, it discusses practical applications like PGP, S/MIME, SSL, and IP security, along with their operational mechanisms and security features.

Uploaded by

likithadadi84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT-I

1. Explain the categories of security threats.


2. Explain active and passive attacks in detail.
3. Differentiate policies, mechanisms and services in network security.
4. Differentiate between symmetric and asymmetric encryption.
5. Write a brief note on integrity and non-repudiation with an example.
6. Explain the network security model with neat sketch.
7. Illustrate a brief note on security goals.
8. Define security attack, security mechanism and security services.
9. Explain different types of security services
10.What are the basic mathematical concepts used in cryptography?
Explain with examples.
11.Explain various types of cryptanalytic attacks and cryptanalysis and
cryptology.
12.What is steganography? explain the techniques in it, it from
cryptography.
13.What kinds of services are provided for data security? Discuss in
detail.
14.Define plain text, cipher text, enciphering, deciphering with an
example.
15.Explain the aspects required for network security model.
UNIT-II
1. Explain about the essential ingredients of symmetric cipher.
2. Compare and contrast between stream cipher with block cipher.
3. List and explain block cipher modes of operation.
4. Explain DES and different modes of operation in DES state its advantages
and disadvantages.
5. Explain the techniques involved for each round in DES with neat sketch
6. Differentiate between cryptanalysis and brute force attack.
7. Explain about symmetric key cryptography and public key cryptography.
8. Explain AES and various operations used in its round function.
9. Briefly explain AES with neat sketch.
10.Explain the transformation functions and key expansion for each round
in AES.
11.Write about different symmetric key ciphers.
12. Draw the general structure of DES and explain encryption and
decryption
13. Explain the block structures and S-Box design used in DES algorithm.
14.Describe about RC4 and RC5 algorithm.
15.Explain the strength and weakness of DES algorithm.
16.Describe various mathematics used for symmetric key encryption
algorithm.

UNIT-III
1. Explain various mathematics used for asymmetric key cryptography.
2. Explain round functions of Advanced Encryption Standard Algorithm
3. State the differences between diffusion and confusion .
4. Brief the strength of RSA algorithm and analyze its performance.
5. Perform encryption and decryption using RSA for p=17, q=11, e=7,
M=88
6. Write about elliptic curve cryptography.
7. Explain substitute byte transformation in AES.
8. Explain the primitive operations of RC5.
9. Explain the primitive operations of RC5.
10.Differentiate between private key and public key encryption.
11.Perform decryption and encryption using RSA algorithm with
p=3,q=11,e=7,N=5
12.Justify your answer whether Diffie Hellman key exchange protocol is
vulnerable.
User A&B exchange the key using Diffie Hellman algorithm assume A=5,
q=11, XA=2,XB=3 find YA,YB,K
13.Explain the approaches to attack the RSA algorithm.
14.State the difference between AES decryption algorithm and the
equivalent inverse cipher.
15.Explain RSA algorithm in detail. Identify the possible threats for RSA
algorithm and list their counter measures.

UNIT-IV
1. Explain HASH function and its properties in cryptography.
2. Explain the classes of message authentication function.
3. Briefly explain the requirements of message authentication.
4. Differentiate between MAC and Hash function.
5. Differentiate between internal and external error control.
6. Explain the role of compression function in hash function.
7. Explain any one Hash algorithm.
8. Explain the requirements of digital signature scheme.
9. Differentiate between message authentication and one-way hash
function.
10.Write the difference between MD5 and SHA.
11.Explain secure hash algorithm in detail.
12.Explain different types of attacks that are addressed by message
authentication.
13.Give a brief note on digital signature algorithm.
14.Explain in detail about hash function.
15.Discuss about the objectives of HMAC and its security features.
16.Explain MD5 with neat sketch.

UNIT-V
1. Explain the operational description of PGP.
2. Write a short note on S/MIME.
3. Explain the architecture of IP security.
4. Write a short notes on Authentication header and ESP.
5. Explain in detail the operation of SSL .
6. Write a short notes on E-mail security.
7. Explain the services provided by PGP.
8. Differentiate between SSL version 3 and TLS.
9. Give a brief note on IP security.
10. Explain internet key management in IPSEC.
11. Explain SET with neat sketch.
12. Explain the features of SET.
13. Write a short notes on web security.
14. Explain the steps involved in SET.
15. Differentiate between SSL connection and SSL session.
16. Why is the segmentation and reassembly function in PGP needed
explain?

You might also like