You are on page 1of 5

S.S.E.

T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
MODULE 1
QUESTION BANK
1. What are the motivations of cyber attack? (Attack goals)
2. Explain the different types of cyber attacks
3. Define vulnerability. Explain them in the domain of security
4. Explain different types of defence strategies and techniques
5. Explain guiding principles of modern security practice.
6. How is GCD calculated with Euclid’s algorithm? Calculate the GCD of (270, 192)
7. Explain Euclid’s algorithm
8. Explain Extended Euclidean Algorithm
9. Find the inverse of 12 modulo79
10. Define the terms Ring, Group, Field.
11. What is a ring and a commutative ring (field)? Differentiate
12. For which value of n, does the group G= < Zn*, x> have primitive roots (generator): 17, 20, 38
and 50.
13. Explain Langranges theorem, Euler’s theorem, Fermat’s Little theorem
14. Find the value of Ø( 100) and Ø ( 80)
15. TESTING GENERATOR
16. Explain the Chinese remainder theorem with an example?
17. Explain Chinese Remainder Theorem. Using CRT find ‘x’ from the equations x 7 mod 13 and
x 11 mod 12
18. List the diffrenece between Secret( Symmetric) Versus Public( Asymmetric) key Cryptography
19. Explain different types of cryptographic attacks
20. What is the difference between mono alphabetic and poly alphabetic cipher?
21. Use Caesar cipher (Monoalphabetic substitution) with key =15 to encrypt the message “Hello”.
(advantage and disadvantage ,attack)
22. Use Vigenere Cipher (Polyalphabetic Cipher) with key HEALTH to encrypt the message “Life is
full of surprises”. (advantage and disadvantage ,attack)
23. Using Hill Cipher to encipher the message “we live in a insecure world”. Use the key
(03 02
05 07) (advantage and disadvantage ,attack)
24. What is one time pad technique? List the advantages and disadvantages.
25. What are the different transposition techniques (Elementary Transposition Ciphers)? Explain.
26. What are Confusion and Diffusion properties of Modern Ciphers?
27. Differentiate Block Ciphers and Stream Ciphers
28. What is a product cipher? Explain three round SPN (Substitution Transposition Network)
Network.
29. Name the Ciphers that follow Feistel Structure. Explain Data Encryption Standard (DES)
operation in detail.
30. Explain the attacks on Single DES, Double DES
31. How is meet in the middle attack done in 2-DES?
32. Explain the different modes of operation of block oriented Secret Key system with advantages
and disadvantages.
33. How do you convert a block cipher into a stream cipher by using the Cipher Feedback (CFB)
mode? Explain.
S.S.E.T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
34. Explain the different steps involved in Linear Cryptanalysis.

CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW


MODULE 2
QUESTION BANK
1. Explain the steps involved in RSA operation
2. Given p=19, q=23, and e=3 Use RSA algorithm to find n, Ø (n) and d.
3. What is the cipher text if the plain text is 63 and public key is 13? Use RSA algorithm.
4. Explain the performance parameter (time complexity, Speeding up RSA, Software) of RSA
algorithm
5. What are the practical issues (generating Primes, side channel and other attacks, Small exponent
attack, side Channel attack) related to RSA.
6. What are the attacks that are possible on RSA?
7. Explain PKCS (Public Key Cryptography Standard) standard.
8. What are the criterion of cryptographic hash function?
9. What is one way property, weak and strong collision resistance?
10. What are the properties of hashing functions?
11. What are the requirements of hash functions?
12. Illustrate Secure Hash algorithm in brief.
13. Explain the compression of Secure Hash Algorithm.
14. Give the structure of HMAC. Explain the applications of HMAC
15. What is the difference between Hash function and Message Authentication Code?
16. Distinguish between message integrity and message authentication.
17. What is Birthday Attack on Digital Signatures?
18. What are discrete logarithms? Explain how are they used in Public Key
19. Cryptography?
20. Briefly explain the Diffie Hellman Key Exchange algorithm?
21. Let q=353 and g=3. Xa=97, Xb=233. Use Diffie Hellman Key exchange algorithm to find Ya,
Yb and Secret key K.
22. Explain Man-in-the middle attack on Diffie Hellman Key exchange protocol
23. Illustrate ElGamal Encryption and decryption algorithm
24. Explain ElGamal Crypto System with examples.
25. Discuss the security of ElGamal Crypto System
26. Write about key generation, encryption and decryption in ElGamal Cryptosystem.
27. Which four tasks are performed in each round of AES Cipher? Explain.
28. Explain the Key Expansion process in AES.
29. Write about the following in AES cipher:
Substitute Bytes Transformation
ShiftRows Transformation
MixColumns Transformation
AddRound Key Transformation
S.S.E.T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
MODULE 3
QUESTION BANK
1. What is meant by key management.explain with different scenarios
2. Explain the authentication procedures defined by X.509 certificate. Illustrate the basic concept of
‘certificate chain’ for verification of digital signature on X.509 certificate
3. What is meant by PKI?
4. Explain the functions of Public Key Infrastructure (PKI)
5. Explain with neat diagram different types of PKI architectures.
6. Identify three approaches to handling digital certificate revocation and mention the tradeoffs
involved.
7. Explain Identity Based Encryption (IBE)
OR
8. Explain how PKG(Private Key Generator) in IBE make use of Bilinear pairings for
cryptosystem.
9. Explain the One-way Authentication techniques.(Password-based, Certificate based)
10. Explain Mutual authentication techniques. (Shared Secret based authentication, Asymmetric
Key based (public key cryptography) authentication)
11. Explain the different types of Dictionary attack. Which protocol is used to defeat dictionary
attack (EKE- Encrypted Key Exchange). Explain in detail.
12. What is the role of Key Distribution centre?
13. Which two protocols are used for Centralized Authentication? Explain how message
confidentiality is achieved using KDC.
14. Explain Needham-Schroeder Protocol different versions with attack possible on each version.
15. Give an overview of Kerberos 4 dialogue
16. What are the different servers used in Kerberos? Explain the role of each one
17. Write the authentication dialogue exchanged between a user and authentication
server in Kerberos.
18. What is Biometric authentication? Explain the Characteristics of a good biometric.
19. Explain the error measures to be considered for biometric authentication.
20. Explain the case studies: Fingerprints and Iris Scans for biometric authentication.
21. What services are provided by IPSec?
22. What are the contents of a IPSec Security Association?
23. Explain about IPSec architecture and Security associations
24. Differentiate between tunnel mode and transport mode of IPSec
25. What is Transport mode and Tunnel mode? Explain about the scope of AH (Authentication
Header) and ESP (Encapsulating Security Payload) in these modes?
26. Briefly explain Encapsulating IP Security Payload?
27. How is replay attack prevented by IPSec?
28. What is replay attack? What is the counter measure for it?
29. Explain IPSec Cookies. What is the purpose of using it?
30. How many Phases are involved in IKE? Explain each IKE (Internet Key Exchange Protocol )
Phase in detail.
31. Write short note on VPN( Virtual Private Network)
S.S.E.T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
32. What protocols comprise SSL or TLS? What is the difference between an SSL connection and an
SSL session?
33. Explain Secure Socket Layer (SSL) or TLS (Transport Layer Security ) in details?
34. Explain about SSL Handshake protocol

CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW


MODULE 4
QUESTION BANK

1. With neat diagram explain the infrastructure of wireless LAN


2. What is WEP(Wired Equivalent Privacy) protocol. How it provides authentication in wireless
LAN. What are flaws involved in it.(Attack)
3. Explain 802.11i protocol for authentication and Key agreement in wireless LAN.
4. Explain how each key in 802.11i was derived and where it is used.
5. What are the main goals of four- way Handshake in 802.11i? Explain the procedure.
6. Explain the Confidentiality and integrity achived using WEP. Which type of attack is possible on
it? Explain How these attacks are mitigated in TKIP and in CCMP
7. Explain Wireless Protected Access (WPA- also Known as TKIP(Temporal Key Integrity
Protocol)) Protocol
8. Explain Wireless Protected Access -2(WPA-2- also Known as CCMP (Counter Mode with CBC
MAC Protocol)) Protocol).
9. What is the difference between TKIP and CCMP
10. Explain the two phase key mixing in TKIP
11. Explain the MAC generation and encryption in CCMP
12. List and explain the Virus Characteristics
13. List and explain Worm Characteristics or attributes.
14. List the classification of worms based vector of propagation. Give examples. Explain.
15. Explain the different types of worm propagation models
16. Explain the internet Scanning worms
17. Explain Topological worms (E-mail Worms, P2P Worm)
18. Explain Web worm with case study XSS Worm.
19. What are the main functions of firewall? Explain it.
20. With an example explain the Policies and Access Control lists of firewall.
21. Explain the different types of firewalls with an example.
22. What are the practical issues related to firewall placement and configuration. Explain in detail
both the issues.

Only till firewall


S.S.E.T’S
S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY, BELAGAVI
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
MODULE 5
QUESTION BANK

1. Explain the historical background, Object, Extent, Scope and Commencement of the Information
Technology Act.
2. Explain the important provisions under IT Act
3. Define Digital Signature. Discuss provisions relating to Digital Signature and Electronic
Governance under the Information Act, 2000
4. What do you understand by Digital Signature? Discuss the use of Digital Signature in e-
governance
5. Attempt the following :
a) Attribution, Acknowledgement and Dispatch of Electronic Records.
b) Duties of the subscribers.
6. Explain the provisions relating to time and place of dispatch and receipt of electronic record.
7. List and explain the Regulation of Certifying Authorities.
8. Discuss the powers and functions of Controller of Certifying Authorities under the Information
Technology Act, 2000.
9. Who will issue DSC (Digital Signature Certificate). What are the necessary steps should be taken
while issuing, Suspension, Revocation of DSC?
10. Explain regarding penalties and Adjudication in IT act
11. Critically examine the various penal provisions under the Information Technology Act, 2000.
12. Discuss provisions relating to Cyber Regulation Appellate Tribunal. Where does the appeal lie
from its decision?
13. Explain the powers of the Cyber Appellate Tribunal
14. What is the liability of network service providers under the Information Technology Act, 2000?
15. Attempt the following :

a) Licence to issue Digital Signature Certificate


b) Tampering with computer source documents
c) Hacking with computer System
d) Legal Recognition of digital signature
e) Legal Recognition of Electronic record
f) Advisory Committee
g) Punishment for Cyber terrorism
h) Publication of Obscene material
i) Advisory Committee Unauthorized modification of Computer Programmes.
j) Service Providers Liability.
k) Cyber Regulation Appellate Tribunal
l) Electronic Records.

You might also like