You are on page 1of 3

CRYPTOGRAPHY AND NETWORK SECURITY

UNIT-I
1. Explain OSI Security Architecture
2. List and define categories of security attacks and services
3. List and explain the security mechanisms
4. Draw a matrix that shows the relationship between security mechanisms and attacks
5. Define computer security. Give examples of recent computer security attacks which you
know
6. How would you test a piece of cipher text to determine quickly if it was likely the result of a
simple substation? Explain
7. List and difference between Cryptography and cryptanalysis with example
8. Explain Classical Encryption Techniques with any one of the encryption techniques examples
9. Explain Caesar Cipher with an example
10. Explain Monoalphabetic Ciphers with an example
11. Explain Playfair Cipher with an example
12. Explain Hill Cipher with an example
13. Explain Polyalphabetic Ciphers with an example
14. Explain Transposition Techniques with an example of rail fence technique

UNIT-II

1. Explain stream and block ciphers


2. Explain two categories of symmetric ciphers
3. Mention the block cipher design principles What is the importance of key size and
number of rounds in block ciphers
4. Explain the process of Encryption in DES. Comment on the strength of DES
5. Mention the key size, block size and Mathematical operations used by RC4 algorithm.
Describe the RC4 encryption function
6. What is meant by Man in the Middle attack?
7. What is triple DES? What is triple DES with two keys? What is triple DES with three
keys? Draw a diagram of TRIPLE DES with two keys
8. Explain the cryptanalysis of DES in detail
9. Differentiate between CFB and OFB modes
10. Explain the working of AES algorithm

UNIT-III
1. State Fermat’s little theorem. What is the importance of this theorem in RSA crypto system
2. Let p = 7, q = 11. Assume ‘e’, find ‘d’, Encrypt the message “Hello World” using RSA
algorithm
3. Define Euclidean algorithm. Write the pseudo code of the algorithm. Use this algorithm to
find the greatest common divisor of 2740 and 1760
4. Explain RSA algorithm with example
5. Describe the possible attacks on Diffie Hellman key exchange mechanism
6. Use Fermat's Theorem to find a number x 85between 0 and 28 with x 85 congruent to 6
modulo 29
7. List and explain the principles of public key cryptosystems
8. Perform encryption and decryption using the RSA algorithm for the following:
a. p = 3; q = 11, e = 7; M = 5
b. p = 5; q = 11, e = 3; M = 9
c. p = 7; q = 11, e = 17; M = 8
9. How keys are distributed in public key cryptographic algorithms?
10. Discuss the four possible approaches to attack the RSA algorithm
11. Explain Chinese Remainder Theorem
UNIT-IV
1. Explain the use of hash function for message authentication
2. What is the need for Digital Signatures? What are the properties and requirements for a digital
signature and difference between conventional signature and digital signature?
3. Distinguish between HMAC and CMAC
4. List the main features of the SHA-512 cryptographic hash function. What kind of
compression function is used in SHA-512?
5. Is it possible to use a hash function to construct a block cipher with a structure similar to
DES? Because a hash unction is one way and a block cipher must be reversible, how is it
possible?
6. Explain Message Authentication Requirements and What are the attacks related to message
communication?
7. List and describe the steps involved in processing of a message using SHA-512
8. Explain Authenticated Encryption: CCM, GCM
9. Explain requirements for Message Authentication Codes HMAC, DAA and CMAC

UNIT-V
1. Describe the trust management in X.509
2. Differentiate between SSL and TLS
3. What are the data types and subtypes in MIME? And also discuss the limitations of SMTP
4. Explain types of firewalls
5. Differentiate between the transport mode and tunnel mode of IP Sec and explain how
authentication and confidentiality are achieved using IP Sec
6. What are the two levels of alerts? What action is taken by SSL when a fatal level is received?
Explain
7. In S/MIME, explain how Bob and Alice exchange the secret key for encrypting messages.
8. Where would you place a web server in an organization assuming that you can use a network
firewall and why?
9. What is the role of encryption in the operation of virus? Explain
10. Give the operational description of PGP
11. List the limitations of SMTP/5322 scheme
12. Explain IP security Policy and Encapsulating Security Payload
Concepts

UNIT-I
1. The OSI Security Architecture
2. Cryptography & Cryptanalysis
3. Attacks, services and security mechanisms
4. Caesar Cipher
5. Playfair Cipher
6. Hill Cipher
7. Transposition Techniques rail fence technique

UNIT-II
1. Data Encryption Standard (DES) algorithm
2. Differential and linear cryptanalysis
3. Triple DES
4. Block cipher design principles and modes of operation
5. Advanced Encryption Standard (AES)
6. Stream Ciphers: RC4

Module III
1. Divisibility and The Division Algorithm
2. The Euclidean Algorithm
3. Fermat’s and Euler’s Theorems,
4. Chinese Remainder Theorem
5. Public Key Cryptography Principles of public key cryptosystem
6. RSA algorithm
7. Diffie Hellman Key Exchange

Module IV

1. Message Authentication Hash Functions and Secure Hash Algorithm (SHA) SHA512,
SHA 3
2. Message Authentication Code (MAC)
3. Digital Signatures
4. Requirements for Message Authentication Codes
5. HMAC
6. Digital Signature Standard (DSS)
7. Authenticated Encryption: CCM, GCM

Module V
1. Distribution of Public Keys
2. X.509 Certificates
3. Internet Security: SSL and TLS
4. Email Security: Pretty Good Privacy (PGP), S/MIME
5. IP Security: IP security Policy, Encapsulating Security Payload

You might also like