Sie sind auf Seite 1von 5

MARWADI EDUCATION FOUNDATIONS GROUP OF INSTITUTIONS FACULTY OF ENGINEERING, GAURIDAD CAMPUS.

DEPARTMENT OF COMPUTER ENGINEERING Faculty Name Prof. Munindra Lunagaria Designation Assistant Professor Subject/ Subject code IS / 160702 Semester/ Branch 6th C.E.(FOE)

Question Bank
MUST refer * QUESTIONS ONCE. SECTION - I Conventional Encryption & Techniques *1. 2. 3. 4. Draw and explain the Conventional Encryption Model. Draw and explain the Conventional Cryptosystem Model. Explain different cryptographic techniques. Define following terms: a. Cryptanalyst b. Cryptanalysis. 5. List various possible attacks on encrypted messages. *6. Write short note on Rotor machine. 7. Define Steganography and explain various techniques for steganography. *8. What is the difference between monoalphabetic cipher and polyalphabetic cipher. *9. Explain following classical ciphers with example a. Caesar Cipher b. Hill Cipher c. PlayFair Cipher *10. Explain Simplified DES with diagram 11. Differentiate block ciphers and stream ciphers. *12. Explain Fiestel Structure with diagram 13. List the design elements of Fiestel Structure. *14. Differentiate following terms: a. Confusion b. Diffusion. *15. Draw and explain the DES Algorithms *16. Draw and explain the Single round of DES Algorithms 17. Define following terms: a. Linear Cryptanalysis b. Differential Cryptanalysis 18. Explain block cipher design principles.

MARWADI EDUCATION FOUNDATIONS GROUP OF INSTITUTIONS FACULTY OF ENGINEERING, GAURIDAD CAMPUS.


DEPARTMENT OF COMPUTER ENGINEERING

*19. Explain with diagram for following Block cipher modes of operations a. ECB, b. CBC, c. CFB, d. OFB 20. Explain with diagram: TDEA *21. Explain following algorithms a. Blowfish, *b. Rc5, *c. Cast128, d. Rc2 22. Explain traffic confidentiality. 23. Explain automatic key distribution for connection oriented protocol. 24. Explain various sources of random number generation and also illustrate properties of random numbers. *25. Explain pseudorandom number generation.

MARWADI EDUCATION FOUNDATIONS GROUP OF INSTITUTIONS FACULTY OF ENGINEERING, GAURIDAD CAMPUS.


DEPARTMENT OF COMPUTER ENGINEERING IP Security E-Mail Security 2*6. What is IPSec? Draw the architecture of it. 27. Give examples of applications of IPSec. 28. What services are provided by IPSec? *29. Explain authentication header of IPSec. *30. What is ESP? Explain the header format for ESP. *31. What are the basic approaches to building SAs? 32. What is the different between transport mode and tunnel mode? 33. What are the five principal services provided by PGP? 34. How does PGP use the concept of trust? *35. Write short note on MIME. *36. What is S/MIME and list out and briefly explain the functionality provided by it. Web Security 37. Find and draw the relative location of following security facilities in the TCP/IP Protocol stack: a. IP/IPsec b. SSL or TLS c. PGP d. S/MIME e. SET *38. What protocols comprise SSL? *39. List and briefly define the parameters that define an SSL session states. *40. List and briefly define the parameters that define an SSL session connection. 41. What is SSL Record Protocol? Explain two services provided for SSL connections by this protocol. *42. Explain SSL Handshake protocol. *43. Compare TLS and SSL. *44. What is SET? Briefly explain key features of it. 45. List and briefly define the principal categories of SET participants. 46. What is dual signature and what is its purpose in SET? 47. List out different SET transaction types. 48. What is firewall? List design goals (principles) for firewall. 49. Write short note on Trusted systems 50. List out different types of firewall and explain any one type of firewall.

MARWADI EDUCATION FOUNDATIONS GROUP OF INSTITUTIONS FACULTY OF ENGINEERING, GAURIDAD CAMPUS.


DEPARTMENT OF COMPUTER ENGINEERING SECTION II Number Theory 51. Explain the Euclids Algorithm to find out Greatest Common Divisor of two positive integers. *52. Discuss Eulers Theorem with example. Public Key Cryptography 1. Explain Public-Key Cryptosystem with various ingredients. 2. Differentiate Conventional Encryption and Public-Key Encryption. 3. Discuss implementation of Public-Key Cryptosystem for secrecy. 4. Discuss implementation of Public-Key Cryptosystem for Authentication. *5. Discuss implementation of Public-Key Cryptosystem for secrecy and Authentication. 6. Discuss vulnerability of Public Key Encryption scheme. 7. Explain most widely accepted and implemented algorithm for PKC. 8. List and discuss various approaches for attacking RSA algorithm. Message Authentication and Hash Function 1. What do you mean by Authentication? List and explain various Authentication Requirements. 2. What do you mean by Authenticator? Explain various types of functions used to produce an authenticator. *3. What is MAC? Explain in detail. 4. Discuss various uses of Hash function. *5. Differentiate Message Authentication Code and Hash Function. 6. Discuss various properties that Hash function.

MARWADI EDUCATION FOUNDATIONS GROUP OF INSTITUTIONS FACULTY OF ENGINEERING, GAURIDAD CAMPUS.


DEPARTMENT OF COMPUTER ENGINEERING Network Security 1. What is Digital Signature? How it is superior to Message Authentication? Explain with example. *2. Discuss various properties that Digital Signature must have. 3. Discuss Direct Digital Signature and Arbitrated Digital Signature. *4. Discuss Mutual Authentication and one-way Authentication. *5. Explain RSA and DSS approaches to Digital Signature. *6. Discuss Digital Signature Algorithm. **7. Discuss Kerberos authentication service. **8. Explain format of X.509 certificate with various elements.

Prof. Munindra Lunagaria Subject In-Charge, Computer Engineering Dept. MEFGI

Prof. Vipul M. Vekariya Head of Department, Computer Engineering, MEFGI

Das könnte Ihnen auch gefallen