Você está na página 1de 2

UNIT 1

1.

Define a Security attack. Explain in detail about the various types of attacks an Internetwork

is vulnerable to.
2. Write about Man-in-the-middle attacks.
3. What is a Security attack? Give the classification of the Security attacks. Discuss the
following terms in detail with relevant examples:
i. Interruption ii. Interception

iii. Modification iv. Fabrication

4. Encrypt the message this is exercise using the following ciphers. Ignore the spaces between
the words while encrypting.

(6M)

(a)

Caesar cipher using the Key=5

(b)

Play fair using the key=Monarchy

(c)

Transposition cipher

5. With neat illustration explain Advanced Encryption Standard algorithm (AES).


6. Describe the Symmetric Cipher Model
7. Explain various substitution and Transposition Ciphers with examples
8. With neat illustration explain data Encryption Standard algorithm (DES).
9. Describe the modes of Block Ciphers with design principles
10. Give the architecture of Triple DES
11. Write importance of Rotor machine.
12. Explain Symmetric Key distribution techniques.
13. Explain various security services with examples.
UNIT 2
1. Perform the RSA algorithm on the given data and explain how encryption and decryption are
performed on the message: p=17, q=31; e=7; M=2.
2. Explain Diffie Hellman Key Exchange with suitable example
5. Differentiate secret key with the Public-key cryptography.
6. How to distribute the secret keys using public key cryptography?
UNIT 3
1.
2.
3.
4.

Illustrate the use of Fermats and Eulers Theorem


Describe Chinese Remainder Theorem
Describe the use of Discrete Logarithms
What is psudeo random number? Differentiate random number with PSRN

5. Describe the Applications of Cryptographic Hash functions.


6. Describe the X.509 version 3 and version 2 in detail.
7. Explain Secure Hash Algorithm in detail.
8. Write in detail structure of Whirlpool Authentication function.
9. Explain the concept of Digital signatures with Digital Signature Standard
UNIT 4
1. Explain Kerberos Version 3 and Version 4
2. Describe the five principal services that Pretty Good Privacy (PGP) provides.
4.Discuss about the documents regarding IPSec protocol?
5.Describe any four ISAKMP payload types listing the parameters of the payload?
6.What is the purpose of padding field in ESP packet.
7.Distinguish between transport mode AH and tunnel mode AH
8.What is SSL session? Can a session be shared among multiple connections? What are the
parameters that define a session state?
9.List the sequence of events that are required for a secure electronic transaction?
10.Write a short notes on :
a)
b)
c)
d)

Alert protocol
SET participants
Padding in SSL and TLS
Record Protocol

11.List the characteristics of a good firewall implementation?


12. Difference between Virus and Worms.
13. Explain various types of viruses and Virus Immune detection system
14. List and Explain various types of firewalls.

Você também pode gostar