Sub: Cryptography and Information Security
Branch: CSE
Year & Sem: III-II
Important Questions Unit Wise
Unit-I
1. What are security mechanisms? Explain.
2. What is steganography?
3. List and briefly define categories of Security Services and attacks.
4. What are the principles of security?Explain.
5. What is symmetric key cryptography? Discuss its advantages and limitations.
6. Explain various substitution techniques with suitable examples.
7. Explain the transposition techniques.
8. Compare transposition ciphers with substitution cipher.
9. Compare Symmetric and Asymmetric key cryptography.
10. Explain about the Model for Network Security.
Unit-II
1. Differentiate between RC 5 and blowfish.
2. Explain RSA algorithm with suitable examples.
3. Write a short note on Stream Cipher RC4.
4. Explain the AES algorithm.
5. In an RSA system, the public key of a given user is e=31, n=3599. What is the private key of this
user?
6. With a neat diagram explain how encryption and decryption are done using Blowfish algorithm?
7. Given two prime numbers p=5 and q=11, and encryption key e=7 derive the decryption key d. Let
the message be x=24. Perform the encryption and decryption using R.S.A algorithm.
8. Explain Diffie-Hellman Key Exchange.
9. What are the Principles of Public Key Cryptosystems?
10. Briefly Explain about DES Algorithm
Unit-III
1. List the main features of SHA-512 cryptographic hash function. What kind of compression
function is used in SHA-512?
2. Explain Message Authentication Requirements and what are the attacks related to message
communication?
3. Give a note on public key infrastructure.
4. What problem was Kerberos designed to address? Explain.
5. Give various Hash Functions. Discuss secure hash algorithm with suitable examples
6. Discuss HMAC and CMAC.
7. Explain X.509 authentication service.
8. Briefly Explain about key distribution.
9. Discuss about Digital Signatures.
10. Explain about Elgamal Digital Signature Scheme
Unit-IV
1. Discuss the IEEE 802.11i Wireless LAN Security.
2. Explain about IEEE 802.1 Wireless LAN.
3. Discuss about Wireless security.
4. Explain about Mobile security.
5. What are the web security considerations in Transport layer security?
6. Discuss about SSH.
7. Explain about Transport layer Security.
8. What is HTTPS? Explain.
9. Explain about Secure socket layer.
10. Write a short note on Secure shell.
Unit-V
1. Briefly explain the scenario of IP security and its Policy.
2. Write a short note on Pretty Good Privacy.
3. Give IP Security architecture with a neat diagram.
4. List and explain the PGP services and explain how PGP message generation is done with a neat
diagram.
5. What is transport mode and tunnel mode in IP sec?
6. Give a brief note on Virtual Elections.
7. Discuss in detail about secure Inter Branch Payment transaction.
8. Give features of Authentication Header.
9. Draw the IP security authentication header and explain the functions of each field.
10. Discuss about Cross site Scripting vulnerability.