0% found this document useful (0 votes)
15 views2 pages

Cryptography & Network Security Assignment

The document is an assignment on Cryptography and Network Security that includes a series of questions covering various topics such as the definitions of cryptography and cyber-security, types of security attacks, cryptographic techniques, and specific algorithms like DES and AES. It also addresses practical applications such as IPSec, PGP, and email security. The assignment requires concise answers and emphasizes the importance of information security principles.

Uploaded by

yapifol990
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Cryptography & Network Security Assignment

The document is an assignment on Cryptography and Network Security that includes a series of questions covering various topics such as the definitions of cryptography and cyber-security, types of security attacks, cryptographic techniques, and specific algorithms like DES and AES. It also addresses practical applications such as IPSec, PGP, and email security. The assignment requires concise answers and emphasizes the importance of information security principles.

Uploaded by

yapifol990
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography & Network Security Assignment

[Use a long notebook and write the answers. Keep it brief and to the point.]

1. What is cryptography? How is it different from cryptology?


2. Discuss the difference between computer security, network security and Internet security.
3. What is Cyber-security? How relevant is it as a stream of study?
4. List the Objectives of Information security emphasizing of CIA Triad.
5. Write down the various types of threats that a computer based information system may be
subjected to.
6. Describe various types of attacks that can take place on computer based information system.
7. What do you understand by security attack, security mechanism and security service? Discuss
briefly.
8. How is active attack different from passive attack? List few of them.
9. What is Denial of service attack? How it works?
10. Explain the term Non-repudiation in context of information security.
11. Explain the following Cryptography Concepts: Plaintext, Cipher text, Cipher, Key, Encipher, and
Decipher.
12. Use an example to illustrate keyless cipher algorithm.
13. How is Block Cipher different from Stream Cipher? Explain.
14. Differentiate between symmetric and asymmetric key algorithms.
15. What are the major points considered in network security implementation?
16. Elaborate the terms Intrusion detection Intrusion prevention.
17. Describe trust & trustworthiness.
18. Describe substitution techniques and transposition techniques used in cryptography.
19. What do you mean by unconditionally secure encryption?
20. Give a brief description of computationally secure encryption.
21. Use an example to describe Caesar cipher.
22. What do you mean by Monoalphabetic Ciphers?
23. Use an example to describe Playfair cipher.
24. What type of cryptographic technique is used in Rail Fence cipher? Explain.
25. How many padding bits must be added to a message of 100 characters if 8-bit ASCII is used for
encoding and the block cipher accepts blocks of 64 bits?
26. Discuss P-Boxes and S-Boxes in block ciphers.
27. What do you mean by Invertibility of P-boxes and S-boxes?
28. Discuss Compression and expansion P-boxes.
29. Describe Product cipher.
30. Explain the concept of diffusion and confusion in context to ciphers.
31. What is the Feistel cipher. Discuss the block cipher design principles.
32. Give a brief working of Data Encryption Standard (DES) algorithm.
33. What do you mean by avalanche effect?
34. Define “Timing attack” in context of cryptography.
35. Discuss Strict avalanche criterion (SAC) & Bit independence criterion (BIC) in brief.
36. Describe differential cryptanalysis and linear cryptanalysis in brief.
37. Explain the working Triple – DES with help of diagram.
38. Why does triple – DES follow an encrypt-decrypt-encrypt (EDE) sequence for encryption and
decrypt-Encrypt-decrypt Sequence (DED) for decryption?
39. Explain Meet – in – middle attack.
40. Describe in brief the working of Advanced Encryption Standard (AES).
41. What is the principal objective of hash function? Discuss in brief.
42. What is the block size of plain text and the key used in IDEA algorithm? How many rounds it
employs for encryption?
43. What is the number of sub keys used in IDEA algorithm?
44. What is co-prime? Give examples
45. What is IPSec? Explain modes of IPSec.
46. How is authentication header implemented in the two modes of IPSec?
47. Discuss structure of PGP (Pretty Good Privacy) in detail emphasizing on the keys used in it.
48. Explain the key elements of RSA Public key encryption.
49. Describe Diffie-Helman key agreement.
50. Solve:
a. 117 mod 13
b. 233 mod 30
c. 242329 mod 243
d. 32500 mod 30
51. Use CRT (Chinese Remainder Theorem) to solve following equations:
a. X ≡ 2 (mod 3), X ≡ 3 (mod 5), X ≡ 2 (mod 7).
b. 4X ≡ 5 (mod 9), 2X ≡ 6 (mod 20)
52. Compute
a. ɸ (5)
b. ɸ (8)
c. ɸ (10)
53. Discuss Token based and Certificate based authentication in detail.
54. What is TCP Session Hijacking? How is it done?
55. Explain the purpose of encapsulating security payload.
56. Discuss Euler’s theorem with example.
57. How is email secured by S/MIME? Discuss.
58. What is Firewall? Discuss different types of firewalls in detail.

You might also like