You are on page 1of 5

G2tech Education g2tech.110mb.


IT1352: Cryptography and Network Security



Subject Code: IT1352 Subject Name: Cryptography and Network Security
UNIT I - INTRODUCTION PART-A 1. What are the essential ingredients of a symmetric cipher? 2. What are the two basic functions used in encryption algorithms?

Year / Sem: III / VI

3. How many keys are required for two people to communicate via a cipher? 4. What is the difference between a block cipher and a stream cipher? 5. What are the two approaches to attacking a cipher? 6. What is the difference between an unconditionally secure cipher and a computationally secure cipher? 7. Briefly define the Caesar cipher. 8. Briefly define the monoalphabetic cipher? 9. Briefly define the playfair cipher. 10. What are the two problems with one-time pad? 11. What is a transposition cipher? 12. What is Steganography? 13. Why is it important to study feistel cipher? 14. Why is it not practical to use an arbitrary reversible substitution cipher? 15. What is the difference between diffusion and confusion? 16. Which parameters and design choices determine the actual algorithm of a feistel cipher? 17. What is the purpose of the S-boxes in DES? 18. Explain the avalanche effect. 19. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher? 20. List the types of cryptanalytic attacks. PART-B 1. Explain the OSI Architecture. (16) 2. Explain Classical Encryption Techniques. (16)


(16) (16) 2 . How many keys are used in triple encryption? 20. Briefly explain about AES design criteria? (16) 8. What is triple encryption? 18. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? 17. Briefly describe about the Strength of DES? (8) 6. Explain Elliptic Curve Architecture. 9. (16) 3. Describe Public Key Cryptography. What is the difference between Shift Rows and Rot Word? 16. What is power analysis? 6. (8) 5.G2tech Education g2tech. Briefly describe Sub Bytes. 3. Briefly describe the Key Expansion Algorithm. Briefly describe Add Round Key. 14. What was the final set of criteria used by NIST to evaluate candidate AES ciphers? 5. Define product cipher. (16) 2. What is the difference between differential and linear cryptanalysis? 2. Describe about Traffic Confidentiality. Briefly explain Block Cipher modes of Operation 7. What is the difference between Sub Bytes and Sub Word? 15. Briefly describe Mix Columns. 13. What is the purpose of the State array? 7. (8) 4. Explain Triple DES with neat diagram (8) UNIT II – PUBLIC KEY ENCRYPTION PART-A 1. What is a meet-in-the-middle attack? 19. Explain RSA algorithm. Briefly explain about DES design criteria? (8) 5. (8) 4. 12. 10.110mb. What was the original set of criteria used by NIST to evaluate candidate AES cipher? 4. Briefly describe Shift Rows. Explain about the various Key management techniques. What is the key size for Blowfish? PART-B 1. How many bytes in State are affected by Shift Rows? IT1352: Cryptography and Network Security 3. How is the S-box constructed? 8. Describe Diffie-Hellman Key Exchange.

5. What primitive operation is used in RC4? 7. What is the difference between Rijndael and AES? IT1352: Cryptography and Network Security UNIT III . What is the difference between statistical randomness and unpredictability? 16. What types of information might be derived from a traffic analysis attack? 10. 12. list potential locations for confidentiality attacks. Explain Hash Functions.110mb. What primitive operations are used in RC5? 4. What primitive operations are used in Blowfish? 2. List ways in which secret keys can be distributed to two communicating parties. Why is it not desirable to reuse a stream cipher key? 6. Briefly describe about the Secure Hash Algorithm? (8) 8. (16) 5.G2tech Education g2tech. (16) 2. (16) 4. What common mathematical constants are used in RC5? 3. 8. What is the difference between link and end-to-end encryption? 9. What is nonce? 14. Describe RIPEMD-160.AUTHENTICATION AND HASH FUNCTION PART-A 1. What is the difference between the AES decryption algorithm and the equivalent inverse cipher? PART-B 1. For user workstation in a typical business environment. Why is the middle portion of 3DES a decryption rather than an encryption? 18. Explain authentication protocol (8) 3 . What is the difference between a session key and a master key? 13. (8) 6. List important design considerations for a stream cipher. What is traffic padding and what is its purpose? 11. (8) 3. Explain Digital Signature Standard. What is key distribution center? 15. Briefly Explain HMAC algorithm. Briefly explain about MD5 algorithm? (8) 7. Explain Authentication Functions.

Define Multipart type. 8. What are the two types of Certificates? 7.(8) 4 .(8) 6. 16. Define Authentication Header. 2. Explain briefly about the Secure Electronic Transaction. 9. What are the Applications required by the Kerberos Servers? PART – B 1.(16) 8. What are the key features of SET? 18.(16) 4. Define S/MIME. Define Public Key Management. What are the services provided by the SSL Record Protocol? 17.509 Authentication Service. Define Kerberos Realm. Define Kerberos.(16) 5. 14. Define Authentication Data. Define PGP. Explain in detail about the IP Security Architecture(16) 10. Define Certification Authority. Define Kerberos Version 5. 11.(16) 9. Discuss briefly about Pretty Good Privacy. What are the IP Security Mechanisms? 13. Explain briefly about X. Discuss briefly about IP Security.(16) 2. 19. Discuss about the concept of Electronic Mail Security. What are the elements include in the Public-Key Certifications? 6.(16) 11.(16) 3.(16) 7.A 1.G2tech Education g2tech.110mb. Explain in detail about the Authentication Header. What are the technical deficiencies involved in the Kerberos Version 4? 5. Explain with elaborate about the Web Security Considerations. Define Kerberos Version 4. IT1352: Cryptography and Network Security UNIT IV NETWORK SECURITY PART . Define S/MIME. What are the applications involved in IP Security? 12. 4. What are the requirements involved in Kerberos? 3. Define Padding. 15.

Define Logic Bomb. What is the role of encryption in the operation of a virus?(16) 5.110mb.(16) 5 . List and briefly define four techniques used to avoid guessable passwords. 15. Define Trojan Horses. 12. 16. Define Rule-Based Anomaly detection. IT1352: Cryptography and Network Security UNIT V SYSTEM LEVEL SECURITY PART – A 1. What re the Major issues derived by Porras about the design of a distributed intrusion detection system? 8.(8) 2. What are the approaches involved in the Intrusion Detection? 6. What are the Characteristics of Firewall? PART – B 1. Define reactive password checking. Define Virus.(8) 3. 3. What is DDoS?(8) 6.G2tech Education g2tech. What are the three main components involved in the distributed intrusion Detection System? 9. 10. 13. Explain briefly about the trusted systems. Define Clandestine User. Define Misfeasor. List out the types of Viruses? 18. What are the four phases involved in the Virus? 17. What are the Techniques involved in intrusion? 5. List and briefly define three classes of Intruders. Define Computer generated passwords. Define Masquerader. What are the three purposes defined by salt? 11. Define Honeypots. 14. 7. What is the role of compression in the operation of a virus?(16) 4. 2.