0% found this document useful (0 votes)
16 views4 pages

CNS 2

The document outlines various concepts related to security, cryptography, and network security across five units. It covers topics such as symmetric and asymmetric encryption, cryptographic algorithms, digital signatures, and secure communication protocols like SSL and PGP. Additionally, it addresses security threats, attacks, and the mathematical foundations of cryptography.

Uploaded by

jaswanth ff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

CNS 2

The document outlines various concepts related to security, cryptography, and network security across five units. It covers topics such as symmetric and asymmetric encryption, cryptographic algorithms, digital signatures, and secure communication protocols like SSL and PGP. Additionally, it addresses security threats, attacks, and the mathematical foundations of cryptography.

Uploaded by

jaswanth ff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT I

1. What is the need for security? Explain various security threats.

2. Explain Simple substitution ciphers with an example.

3. What is Cryptography? What are the main challenges and risks?

4. Decode the message:MXOQCY IFUDT YDWIE CKSXJ YCUED JXYI (Shift code c = p -10).

5. What is a Cryptographic Attack? What are the different types of attacks?

6. Which tools are used by attackers to attack websites?

7. What are the mathematical methods used in cryptography? Give their significance.

8. What is Fermat's theorem? Explain how it is used in security.

9. What is Network Security? What are the four goals of network security?

10. What tricks do attackers use to hack online banking accounts? How to prevent them?

11. Elaborate on attacks threatening confidentiality.

12. What are the two basic ways of transforming a plaintext into a ciphertext?

13. Explain the operational security model with a block diagram.

14. What is timing attack? What are the possible defenses against it?

15. What are the elements of information security? Explain each in brief.

16. List and briefly define categories of security services and attacks.

17. Describe the model for network security with a neat sketch.

18. Explain active and passive attacks in detail.

19. Differentiate policies, mechanisms, and services in network security.

20. Define plaintext, ciphertext, enciphering, and deciphering with examples.

21. What kinds of services are provided for data security?

22. What is steganography? Explain its techniques and how it differs from cryptography.

23. Explain various types of cryptanalytic attacks, cryptanalysis, and cryptology.

24. Write a short note on authentication and data integrity.

25. Write a brief note on integrity and non-repudiation with an example.


UNIT II

1. What is a symmetric encryption scheme? What are the five elements of it?

2. What are the mathematical concepts used in symmetric cryptographic algorithms? How is
algebra used in cryptography?

3. What is ciphertext? Explain with an example the Caesar cipher.

4. Discuss any one symmetric encryption algorithm.

5. Explain DES algorithm with an example.

6. Decode the Caesar Cipher text: Adhziypsspn, hukaolzspaofavclz.

7. What is symmetric and asymmetric encryption? Explain their components.

8. Explain the components of a modern block cipher.

9. Explain p-boxes in modern block ciphers.

10. List and explain block cipher modes of operation.

11. Compare linear cryptanalysis with differential cryptanalysis.

12. Decode Caesar cipher: DOOV ZHOO WKDW HQGV ZHOO.

13. Explain the essential ingredients of symmetric cipher.

14. Compare and contrast stream cipher and block cipher.

UNIT III

1. What is asymmetric encryption? What problems does it solve?

2. Explain the MILLER-RABIN algorithm for primality testing.

3. Discuss RSA algorithm for asymmetric cryptography.

4. Given p = 17 and q = 29, find N, E, and D in an RSA process.

5. What is asymmetric-key cryptography? Discuss its advantages and disadvantages.

6. What is a primality test? Explain its use in asymmetric cryptography.

7. Discuss the 'Elliptical Wave Theory' algorithm for asymmetric cryptography.

8. If A wants to send a message securely to B, explain the steps involved.

9. How is Fermat's theorem used to find multiplicative inverses?

10. What are the different types of primality testing algorithms?


11. Discuss the Diffie-Hellman algorithm for asymmetric cryptography.

12. Given N = 187 and E = 17, find the private key D in RSA.

13. What is key wrapping? Explain its usefulness.

14. Encrypt and decrypt letter 'G' using RSA with E = 3, D = 11, N = 15.

15. Summarize public key cryptographic principles.

16. Explain RSA algorithm with an example where p = 3 and q = 11.

17. Discuss ECC (Elliptic Curve Cryptography) in detail.

18. Explain mathematics used for asymmetric cryptography.

19. Explain differences between diffusion and confusion.

UNIT IV

1. Describe the properties of digital signatures.

2. Write and explain the Digital Signature Algorithm (DSA).

3. What is authentication? Explain its different types.

4. What are the characteristics of acceptable hash functions?

5. What is a digital signature? Explain its benefits.

6. Describe the digital signature process with an example.

7. Explain how authentication is performed in Kerberos.

8. What is a hash function? What are its applications in authentication?

9. What are the three criteria a cryptographic hash function must satisfy?

10. What happens if a 'k' value in DSA is compromised?

11. Explain multiple Kerberos authentication.

12. Explain HMAC algorithm. How can it be optimized for speed?

13. What is the Random Oracle Model? Discuss its attacks.

14. Compare SSL authentication with Kerberos.

15. Explain block cipher-based MAC scheme.

16. Differentiate between MAC and hash functions.


17. Differentiate message authentication and one-way hash functions.

18. Compare MD5 and SHA.

19. Explain Secure Hash Algorithm in detail.

20. Explain the role of the compression function in hash function.

UNIT V

1. What is PGP? Draw and explain the general PGP packet structure.

2. What is SSL? Write short notes on the keys used in SSL.

3. Give the architecture of the e-mail system with a neat sketch.

4. Compare and contrast IPSec and SSL.

5. Explain how PGP performs trust processing.

6. Discuss how SSL provides secure communication.

7. Discuss some application avenues of IPSec.

8. Compare and contrast IPSec and SSH.

9. Write short note on PGP Key Rings.

10. Explain various SSL protocols, their structure, and use.

11. What is IPSec? Why is it necessary in IP network security?

12. Compare and contrast IPSec and TLS.

13. Discuss the services offered by PGP to secure emails.

14. Explain the two modes in which IPSec operates.

15. How does PGP use certificates to authenticate public keys?

16. Explain transport layer security protocol.

17. Enumerate functionalities of the Secure Shell protocol.

18. Explain authentication header and ESP.

19. Explain internet key management in IPSec.

20. Write a short note on S/MIME and email security.

You might also like