cryptography
cryptography
1. What are the differences between symmetric key and asymmetric key cryptography?
2. What is the difference between stream cipher and block cipher?
3. What are passive threats and active threats? Differentiate between passive threats and active
threats.
4. What is ‘packet snooping’ and ‘packet spoofing’?
5. Explain briefly Diffie-Hellman symmetric key exchange algorithm with example. What
type of key is generated or exchanged by using Diffie- Hellmann key exchange algorithm?
Justify.
6. What is Brute force attack and Man-in-the Middle attack? Explain with example.
7. What are the typical contents of Digital Certificate?
8. What is key wrapping? How is key wrapping useful?
9. What do you mean by message digest? 1. What are the key requirements of message
digest?
10. What is PGP? Describe the fields of SSL record protocol header.
11. What is SET? Explain with a suitable model. How pre-master-secret and master-secret is
prepared in SSL handshake protocol?
12. What is a digital envelope? Explain, how digital envelope works.
13. Explain Cipher Block Chaining mode with a suitable diagram.
14.What are CFB and OFB mode? “CFB can be used in the way as if it is working on stream
cipher” – Explain.
15. Explain briefly clear text password authentication with example.
16. What is the difference between MAC and Message Digest?
17. Explain DOS attack.
18. What is a worm? How does it differ from a virus?
19. What is Triple DEA? Why DEA is more secure than DES?
20. What are the issues with smart cards? How these issues are solved?
21. What is electronic money? How does certificate-based authentication work?
22. List and briefly explain different types of Firewalls.
23. What is a meet-in-the-middle attack?
24. What protocols contain SSL?
25. What services are provided by the SSL Record Protocol?
26. What steps are involved in the SSL handshake Protocol?
27. Explain the broad level steps of any of the mail security protocols.
28. Explain the concept of key rings in PGP.
29. Explain the significance of S/MIME in electronic mail security.
30 List the characteristics of a good firewall implementation. What are the limitations of a
firewall?
31. What are the differences between authentication and authorization?
32. What are the five principal services provided by PGP (Pretty Good Privacy)?
1. What are different algorithm modes? Explain those which are applied on block ciphers.
Explain suitable Cipher Feedback mode with a suitable diagram. What types of attacks may
occur on block ciphers?
2. Briefly describe the RSA algorithm and show how it provides security to message / data. In
the public-key system using RSA, you intercept the cipher text CT=1570 sent to a user
whose public key is E=79, N=3337. What is the plain text PT? In a RSA system, the public
key of a user is 17 and N = 187. Calculate the private key and public key?
3. What is digital signature? How digital signatures can be generated? What does digital
signatures provide to a message?
4. What are the different security services provided by PGP? Explain how PGP provides
confidentiality and authenticity of electronic mails. Explain briefly the base-64 conversion
in PGP. Describe the fields of SSL record protocol header.
5. Describe a single round of DES with block diagram. Describe the advantages and
disadvantages of symmetric and asymmetric key cryptography. What is Triple DEA? Why
DEA is more secure than DES?
6. What is firewall? What are different types of firewall? Briefly explain working principle of
each. What are the limitations of firewall? Explain the working principle of DMZ network.
7. What is the difference between stream cipher and block cipher? What types of attacks may
occur on block ciphers? Write the key exchange method for DES?
8. What are the services provided by IPSec? Briefly describe IPSec Architecture? State and
explain how IDEA works.
9. i) For a Vernam Cipher do the following:
ii) The key 'MONARCHY' applies play fair to plain text "FACTIONALISM” to convert to
cipher text at the destination, decrypt the cipher text.
10. Describe a single round of DES with block diagram. “Authentication can be achieved
using DES”- Comment on it. Show that DES decryption is the inverse of DES encryption.
11. List and briefly define three classes of intruders. Name the four key steps in the creation
of a Digital certificate. What are the problems associated with clear text passwords?
12. What are the advantages and disadvantages of using Packet Filter? How can an attacker
break the security of Packet Filter? “The packet filter controls the flow between internal
and potentially hostile network.”- Justify.