You are on page 1of 3

# ENGINEERING COLLEGE (055), TUWA

## INFORMATION AND NETWORK SECURITY (2170709)

QUESTION BANK: B.E.C.E (SEMESTER 7TH)
UNIT 1
1. What is cryptography? Draw and explain the Conventional Encryption Model.
2. Draw and explain the Conventional Cryptosystem Model.
3. Explain different cryptographic techniques.
4. Define following terms:
a. Cryptanalyst

b. Cryptanalysis.

c. Substitution

d. Transposition

## 5. List various possible attacks on encrypted messages.

6. Define Steganography and explain various techniques for steganography.
7. Explain monoalphabetic cipher and polyalphabetic cipher with example?
8. Explain following classical ciphers with example:
a. Caesar Cipher b. Hill Cipher c. PlayFair Cipher d. One time Pad e. Vignere Cipher
-------------------------------------------------------------------------------------------------------------------------UNIT 2
9. Differentiate block ciphers and stream ciphers.
10. Explain Fiestel Structure with diagram.
11. List the design elements of Fiestel Structure.
12. Differentiate following terms:
a. Confusion

b. Diffusion.

13. Draw and explain the DES Algorithms. Give advantages and limitations of DES.
14. What is the purpose of S-Box, P-box in DES algorithm?
15. Explain the Avalanche effect in DES algorithm.
16. Draw and explain the Single round of DES Algorithms
17. Define following terms:
a. Linear Cryptanalysis

b. Differential Cryptanalysis

## 18. Explain block cipher design principles.

19. Explain AES algorithm.
-------------------------------------------------------------------------------------------------------------------------ASST. PROF. RAVIKANT T VANARA

ravikantvanara@gmail.com

+91-942-917-7234

## ENGINEERING COLLEGE (055), TUWA

INFORMATION AND NETWORK SECURITY (2170709)
QUESTION BANK: B.E.C.E (SEMESTER 7TH)
UNIT 3
20. What is multiple encryption? Explain with diagram: TDES
21. Explain with diagram Block cipher modes of operations
-------------------------------------------------------------------------------------------------------------------------UNIT 4
22. Explain Public key cryptosystem with its applications.
23. Explain RSA algorithm with example. Give its four approaches and discuss various attacks on
RSA algorithm.
24. Explain Diffie-Hellman Key exchange algorithm.
25. What is public key cryptography? Compare conventional encryption with public key encryption.
26. What is Man in the Middle attack?
-------------------------------------------------------------------------------------------------------------------------UNIT 5
27. What is Hash Function? Explain its requirements/properties/characteristics, limitation and
28. Explain Hash function based on Cipher block chaining.
29. Explain MD5 algorithm in details.
30. Explain SHA1 algorithm in details. List different version of SHA.
31. Give difference between MD5 and SHA1.
-------------------------------------------------------------------------------------------------------------------------UNIT 6
32. What is MAC? Explain its requirements. Give its advantages and security limitation.
33. Explain MAC based on Hash function (HMAC).
34. Explain MAC based on Block cipher.
-------------------------------------------------------------------------------------------------------------------------UNIT 7
35. What is Digital Signature? Explain its use with the example. Discuss its properties.

## ASST. PROF. RAVIKANT T VANARA

ravikantvanara@gmail.com

+91-942-917-7234

## ENGINEERING COLLEGE (055), TUWA

INFORMATION AND NETWORK SECURITY (2170709)
QUESTION BANK: B.E.C.E (SEMESTER 7TH)
36. Explain RSA and DSS approaches to Digital Signature.
37. Discuss Digital Signature Algorithm (DSA).
38. Discuss Elgamal digital signature scheme.
39. Discuss Schnorr digital signature scheme.
-------------------------------------------------------------------------------------------------------------------------UNIT 8
40. Explain various Key distribution methods.
41. Give difference between Symmetric and Asymmetric Encryption.
42. Explain X.509 authentication service.
-------------------------------------------------------------------------------------------------------------------------UNIT 9
43. Explain Kerberos in detail.
-------------------------------------------------------------------------------------------------------------------------UNIT 10
44. Give comparison of threats in the web.
45. Explain SSL protocol stack /Architecture in detail.
46. Discuss Transport layer security.
47. Explain HTTPS and SSH protocols.
-------------------------------------------------------------------------------------------------------------------------NOTE:

## Question can be twisted (logical question expected) so be prepared for it

Practice examples based on RSA, D-H key algorithm, Substitutions and Transpositions
Techniques.

--------------------------------------------------------------------------------------------------------------------------

## ASST. PROF. RAVIKANT T VANARA

ravikantvanara@gmail.com

+91-942-917-7234