0% found this document useful (0 votes)
2 views2 pages

Ins Sem-5 QB Unit-1

The document is a question bank for T.Y.B.Sc. Sem-V students at G.N. Khalsa College, focusing on Information & Network Security. It covers various topics including computer security, cryptography, encryption techniques, and security services. The questions range from definitions and principles to specific cipher examples and comparisons between different encryption standards.

Uploaded by

kavinnaidu810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views2 pages

Ins Sem-5 QB Unit-1

The document is a question bank for T.Y.B.Sc. Sem-V students at G.N. Khalsa College, focusing on Information & Network Security. It covers various topics including computer security, cryptography, encryption techniques, and security services. The questions range from definitions and principles to specific cipher examples and comparisons between different encryption standards.

Uploaded by

kavinnaidu810
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

G.N.

Khalsa College(Autonomous), Matunga-19


T.Y.B.Sc. Sem-V, UNIT-I Information & Network Security
Question Bank

1.​ What is computer security? What are the objectives of computer security?
2.​ Define the following terms:
i.​ Cryptography
ii.​ Cryptanalysis
iii.​ Brute-force attack
iv.​ Confidentiality
v.​ Integrity
vi.​ Availability
vii.​ Symmetric key Cryptography
viii.​ Asymmetric key Cryptography
3.​ Explain the challenges of computer security.
4.​ Explain Principles of security.
5.​ Write a note on OSI security architecture.
6.​ State and explain Types of active attacks.
7.​ State and explain Types of passive attacks.
8.​ What is a security service? Explain different types of security services.
9.​ List and briefly define categories of security services.
10.​List and briefly define categories of security mechanisms.
11.​ What are the components of a simple symmetric cipher model?
12.​What are substitution techniques? Explain any one with the help of an example.
13.​With the help of an example, explain the encryption and decryption process of Shift Cipher.
14.​With the help of an example, explain the encryption and decryption process of Ceaser Cipher.
15.​With the help of an example, explain the encryption and decryption process of Vernam
Cipher.
16.​Using Shift Cipher encrypt and decrypt text “CORONA” using key=6.
17.​Using Vernam Cipher encrypt and decrypt text “COVID” using key “NCBTA”.
18.​With the help of an example, explain the encryption and decryption process of Vigenère
Cipher.
19.​Using Vigenère Cipher encrypt and decrypt text “BAD” using key “ADD”.
20.​What are transposition techniques? Explain any one with the help of an example.
21.​What are the two general approaches to attacking a cipher?
22.​What is the principle behind One Time pad? Why is it highly secure?
23.​Explain Mono-alphabetic cipher with example.
24.​What are Polyalphabetic Ciphers? Explain with examples.

25.​Explain Playfair Cipher, encrypt the plain text “SECRET MESSAGE” by using
keyword “PROBLEM”.
26.​Explain Hill Cipher with an example.
27.​With the help of an example, explain the encryption and decryption process of Hill Cipher.

28.​Explain rail fence cipher with example.


29.​What is the difference between a Monoalphabetic cipher and a polyalphabetic
cipher?
30.​What is steganography? Explain its types.
31.​With the help of a diagram, explain the working of the DES (Data Encryption
Standard) algorithm.
32.​With the help of a diagram, explain the working of the AES (Advanced Encryption
Standard) algorithm.
33.​Describe the four main transformations (SubBytes, ShiftRows, MixColumns,
AddRoundKey) in AES.
34.​What are the advantages of AES in modern cryptographic systems?
35.​What are the applications of AES ?
36.​Explain the difference between AES and DES in terms of structure and security.
37.​Differentiate between Stream Cipher and Block Cipher.
38.​Explain various modes of block cipher.
39.​What are block ciphers? List various block cipher algorithm modes. Explain any one.
40.​What do you mean by stream cipher? Explain its working.
41.​Write short note on:
i.​ ECB
ii.​ CBC
iii.​ CFB
iv.​ OFB

You might also like