You are on page 1of 2

Question Bank

U19CS702 - Cryptography
PART – A

1. List the various message authentication functions.


2. Define cryptographic checksum
3. List the requirements of Kerberos
4. Draw the SSL protocol stack
5. List the properties of MAC
6. Analyze the PGP cryptography function to provide confidentiality and authentication
7. Outline the SET operations involved during e-transaction with credit card.
8. Can routers and bridges be used as firewalls? How?
9. Compare packet filtering with application gateways.
10. State the requirements of digital signatures.
11. What do you mean by replay attack?
12. What are the design objectives of HMAC?
13. State the protocol which suppresses the replay attacks and at the same time fix the problem of
Needham/Schroeder protocol.
14. What is Kerberos? What are the uses of KDC?
15. What do you mean by Bastion Host?
16. What is meant by IP security? Will IPSec make firewalls obsolete?
17. Identify the security parameters that may be applicable when analyzing e-mail security
18. List out the features and usage of a good password.
19. What is PGP? Mention its services used for E-mail security
20. What are the two modes of operations of IPSec.
21. What are the services provided by firewalls?
22. List the various types of viruses

PART – B

1. Consider secret keys Ka and Kb are shared between A & KDC and B & KDC. Apply Needhem
Schroder protocol to distribute session key Ks to A and B.
2. Summarize the authentication dialogue used by Kerberos V4 for obtaining services.
3. How hash functions are used in message authentication? Discuss in detail about simple hash and
block chaining techniques.
4. Describe how PGP provides confidentiality and authentication services for email application
5. Explain the functions of S/MIME
6. Apply the analysis method used for intrusion in rule based IDS and anamoly IDS.
7. What are the requirements of digital signature? Discuss in detail about direct and arbitrate digital
signature
8. Apply the Statistical Anomaly method for legitimate user where statistical tests are applied to
observed behavior with a high level of confidence.
9. Describe shortly about the functions of Kerberos
10. Explain the process of generating the message digest value using MD5 algorithm with necessary
diagrams and steps.
11. What are the various ways of using hash functions in message authentication? Explain them with
neat diagram.
12. A device with 192.168.1.147 tries to connect to a device with IP (192.0.9.40) ,then the connection is
first verified by firewall that completes the TCP three way handshaking process and if there is a
consequent traffic arises then how it will be detected using packet filtering method?
13. Write a hypothetical dialogue for transmitting the message between client module and server module
with the help of Ticket Granting Service (TGS).
14. Explain the phases of SSL handshake protocol for
a. Establishing security capabilities
b. Server authentication and key exchange
c. Client authentication and key exchange
15. A firewall is to be configured to allow hosts in a private network to freely open TCP connections and
send packets on open connections. However, it will only allow external hosts to send packets on
existing open TCP connections or connections that are being opened (by internal hosts) but not allow
them to open TCP connections to hosts in the private network. In what way we can achieve the
minimum capability of the firewall?
16. An organization has four private networks interconnected across the internet. Hosts on the internal
networks use the internet for transport the data and tunnels at the security gateway to each internal
network. How Authentication Header (AH) works on this scenario for transport mode and tunneling
mode?
17. Explain the technical details of firewall and describe any three types of firewalls with examples
18. Enumerate the need for using firewalls to provide system security.

You might also like