0% found this document useful (0 votes)
3 views1 page

css (2)

The document outlines various topics related to cybersecurity, including authentication protocols, encryption algorithms (AES, DES, Hill cipher), digital certificates, and security mechanisms. It also discusses vulnerabilities in operating systems, phishing techniques, firewalls, and web security. Additionally, it includes numerical problems related to the Hill cipher and Diffie-Hellman algorithm.

Uploaded by

vg.pranaybhoir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views1 page

css (2)

The document outlines various topics related to cybersecurity, including authentication protocols, encryption algorithms (AES, DES, Hill cipher), digital certificates, and security mechanisms. It also discusses vulnerabilities in operating systems, phishing techniques, firewalls, and web security. Additionally, it includes numerical problems related to the Hill cipher and Diffie-Hellman algorithm.

Uploaded by

vg.pranaybhoir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1.​ Explain Needham Schroeder authentication protocol.

2.​ Explain AES algorithm in details.


3.​ Explain DES algorithm in detail.
4.​ Why are digital certificates and signature required? What is the role of digital signature in
digital certificate? Explain any one digital signature algorithm.
5.​ Explain Diffie Hellman key exchange algorithm.
6.​ Enlist various function of protocol of SSL. Explain the phase of handshake protocol.
7.​ Explain web security in detail.
8.​ Explain various authentication protocol detail.
9.​ Explain penetration testing in detail.
10.​Explain session hijacking and management. Also explain clickjacking.
11.​List and explain vulnerabilities in window operating system.
12.​Explain phishing and list different types of phishing techniques.
13.​Explain firewalls in details.
14.​Explain memory and address protection in detail. Write a note on file protection.
15.​Explain database security in brief. What do you understand by multilevel database
security.
16.​Explain Hill cipher algorithm with suitable examples.
17.​List and explain security requirements of a website.
18.​Define the security mechanism and attacks for OSI security architecture.
19.​Explain the different types of firewalls and layer in which it operates.
20.​List and explain in detail security features of operating system.
21.​Write the properties of hash function. List and explain characteristics needed in secure
hash function.
22.​Explain the different modes of block ciphers.
23.​Differentiate between the following: i) MD5 and SHA256 and MD5 and SH-1 algorithm ii)
Digital signature and digital certificate iii) AES and DES
24.​Write a short note on the following: i) Digital certificate X.509 and Public key
infrastructure ii) Different modes of block ciphers iii) Security mechanism and attack for
OSI architecture iv) Double and triple DES v) DNS attack vi) Email attacks

Numerical: Q.1) Use Hill cipher to encrypt the text Q.2) Diffie-Hellman algorithm

You might also like