You are on page 1of 4

Subject: CNS

Question Bank

UNIT – 1

1. Draw a simplified network security model.


2. Differentiate between a block cipher and a stream cipher.
3. Specify the difference between diffusion and confusion.\
4. Which parameters and design choices determine the actual algorithm of a Feistel cipher?
5. What is the purpose of the S-boxes in DES?
6. Explain the avalanche effect.
7. What is the difference between differential and linear cryptanalysis
8. Define meet-in-the-middle attack.
9. Explain the types of attacks on double DES and triple DES.
10. Write the difference between link and end-to-end encryption.
11. What is the difference between differential and linear cryptanalysis?
12. Describe about RC4 algorithm.
13. Write a short note on security attacks.
14. Discuss any four substitution cipher encryption methods and list their merits and demerits.
15. Explain with necessary diagrams about key management, encryption and decryption in
Simplified DES.
16. Discuss the classification of security services in detail.
17. Illustrate with neat diagrams the block cipher design principles and modes of operation.
18. Explain Blowfish algorithm.

UNIT – 2

1. With a neat sketch about key distribution scenario explain the key control schemes.
2. Explain in detail about confidentiality using symmetric key and public key cryptography.
3. Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7 and N=5
4. Explain about the various Key management techniques.
5. Describe Diffie-Hellman Key Exchange.
6. Explain RSA algorithm.
7. Describe Public Key Cryptography.
8. Explain Elliptic Curve Architecture.
9. Compare the Features of SHA-1 and MD5 algorithm
10. Discuss about the objectives of HMAC and it security features.

11. Discuss clearly Secure Hash Algorithm(SHA) (8)


12. Describe the MD5 message digest algorithm with necessary block diagrams.
13. What is Kerberos? Explain how it provides authenticated service.
14. Explain the format of the X.509 certificate.

UNIT – 3

1. User A and B exchange the key using Diffie-Hellman algorithm. Assume α=5 q=11
XA=2 XB=3. Find the value of YA, YB and k.
2. What are the properties a digital signature should have?
3. What is masquerading?
4. Define weak collision property of a hash function.
5. Why is SHA more secure than MD5?
6. Mention the fundamental idea of HMAC.
7. What is the block size of MD5 and how many bits are produced as the message digest?
8. What do you meant by hash function?
9. Differentiate MAC and Hash function.
10. List any three hash algorithm.
11. What are the requirements of the hash function?
12. Distinguish between direct and arbitrated digital signature?
13. What is Birthday attack?

UNIT – 3
1. What is Digital Signature? Give it properties & requirements.
2. Difference between Direct Digital Signature and Arbitrated Digital Signatures.
3. Explain DSS approach.
4. Describe Digital Signature Algorithm.
5. What is Digital Certificate?
6. What is Replay Attack?
7. Define Kerberos. In the content of Kerberos, what is realm?
8. Discuss in detail Kerberos 4 message Exchanges for providing authentication
9. With necessary diagrams explain X.509 authentication service.
10. What is bastion host?
11. How is an X.509 certificate revoked?
12. List four techniques used by firewalls to control access and enforce a security policy.
13. What are the differences between Kerberos Version 4 and Version 5 related to technical
deficiencies?
UNIT – 4
1. What is IPSec?
2. Briefly elaborate applications of IPSec.
3. List benefits of IPSec.
4. Describe IPSec architecture.
5. State various services provided by IPSec.
6. What do you mean by Security association?
7. Explain parameters defining Security association.
8. Explain Transport mode operation of IPSec.
9. Explain tunnel mode operation of IPSec.
10. Describe IPSec authentication header (AH).
11. Explain encapsulating security payload (ESP).
12. What are key management services of IPSec?
13. What is IKE protocol?
14. Define PGP & S/MIME.
15. Explain ISAKMP functions & frame format.
16. Explain characteristics of PGP.
17. Difference between MIME & S/MIME.
18. Explain PGP trust model with diagram.
19. Write a short note on
PGP
S/MIME

UNIT – 4
1. What are web security threats and counter measures?
2. Explain SSL & its features.
3. Explain SSL architecture.
4. Explain SSL record protocol architecture.
5. Briefly explain operation of SSL handshake protocol.
6. Give services & features of SET.
7. What are the participants of a SET system?
8. What is Dual signature? Why it is needed.
9. How dual signature is generated?
10. What are SET overhead?
11. Write the design goals of firewalls.
12. Mention the principle of a packet filtering type of firewall.
13. List out the limitations of firewall.
14. Write replay attack with an example.
15. What is trusted system? How is it useful?
16. Write the use of trusted system.
17. Write a note on intrusion detection.
18. Write the name of some Viruses and worms. Explain it
19. What are the characteristics and capabilities of firewalls? Explain the types of firewalls.

You might also like