Professional Documents
Culture Documents
: I / II
Section
:1
Subject Code
: NE7202
Subject Name
: ME - CSE
Staff Incharge
: Dr.V.Dhanakoti
UNIT-1
PART-A
Prepared By : Dr.V.Dhanakoti
Page 1
PART B
1. What is meant by cryptanalysis? What are the types of cryptanalytic attacks and the amount of
information known to cryptanalyst? What are the features of these attacks?(16)
2. Explain in detail about Active attacks and passive Attacks.(16)
3. Describe in detail about security services.(16)
4. Explain in detail about access control matrix with example (16)
5. Write short notes on following models
i) Biba Integrity model (6)
ii) Lipners integrity model (10)
6. Explain in detail about Clinical information systems security policy (8)
7. Write short notes on following models
i) Bell la-padula model (10)
ii) Biba integrity model (6)
8.i)Describe in detail about clark Wilson integrity model(12)
ii) Describe the lower water mark policy (4)
9.Describe in detail about Confidentiality policies(16)
10.Explain in detail about Hybrid Policies (16)
UNIT-II
PART-A
1. What are the essential ingredients of a symmetric cipher?
2. What are the two basic functions used in encryption algorithms?
3. How many keys are required for two people to communicate via a cipher?
4. What is the difference between a block cipher and a stream cipher?
5. Briefly define the Caesar cipher.
6. Briefly define the monoalphabetic cipher.
7. Briefly define the Playfair cipher.
8. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher?
9. What are two problems with the one-time pad?
10. What is a transposition cipher?
11. What is the difference between diffusion and confusion?
12. Which parameters and design choices determine the actual algorithm of a Feistel cipher?
13. What is the purpose of the S-boxes in DES?
14. Explain the avalanche effect.
15 What is the difference between differential and linear cryptanalysis?
16.What is the purpose of the State array?
17. What is the difference between SubBytes and SubWord?
18. What is the difference between ShiftRows and RotWord?
19 What is the role of a compression function in a hash function?
20. What are some approaches to producing message authentication?
Prepared By : Dr.V.Dhanakoti
Page 2
PART-B
1. Describe in detail about Substitution ciphers with examples (16)
2. Explain in detail about linear cryptanalysis and differential cryptanalysis (16)
3. Explain in detail about Data Encryption Standard (16)
4. Describe in detail about Advanced Encryption standard (16)
5. Write short notes on the following
i) HMAC (8)
ii) SHA-512(8)
6. Describe in detail about hash function and Message authentication code (16)
7. Write short notes on the following
i) Ceaser cipher (3) ii) polyalphabetic cipher (3)
iv) Playfair cipher(3) iii) vernam cipher (3)
v) Transposition method of encryption (4)
8. Write short notes on the following
i) MAC (8)
ii)Hash function(8)
9. Describe in detail about authentication protocols (16)
10. Describe in detail about Message Authentication function.(16)
UNIT-III
PART-A
1. What is an elliptic curve?
2. What is the zero point of an elliptic curve?
3. List ways in which secret keys can be distributed to two communicating parties.
4. What is the difference between a session key and a master key?
5. What is a nonce?
6. What is a key distribution center?
7. What are two different uses of public-key cryptography related to key distribution?
8. List four general categories of schemes for the distribution of public keys.
9. What are the essential ingredients of a public-key directory?
10. What is a public-key certificate?
11. What are the requirements for the use of a public-key certificate scheme?
12. Briefly define a group, ring and field
13. What is the difference between modular arithmetic and ordinary arithmetic?
14. What are the principal elements of a public-key cryptosystem?
15. What are the roles of the public and private key?
16. What are three broad categories of applications of public-key cryptosystems?
17. What requirements must a public key cryptosystems fulfill to be a secure algorithm?
18. What is a one-way function?
19. What is a trap-door one-way function?
20. Describe in general terms an efficient procedure for picking a prime number.
Prepared By : Dr.V.Dhanakoti
Page 3
PART-B
1. Explain in detail about public key encryption with neat diagram (16)
2. i)Describe in dtail about RSA Cryptosystem (10)
ii) Write Short Notes on RSA Attacks(6)
3.i)Explain in detail about El-Gamal Crypto system(10)
ii) Consider an ElGamal scheme with a common (6)
prime q=71 and primitive root =7.If B has public key YB =3 and A chose the
random
integer k=2 what is the cipher text of M=30?
4. Consider an ElGamal scheme with a common prime q=11 and primitive root =2 . k=2
i) If A has public key XA =5 What is As private key YA
ii)If user B has private key XB=12 what is Bs public key YB
iii) What is the cipher text of M=30?
5. Explain in detail about Digital signature with diagrams(16)
6. i)Explain in detail about Elliptic curve Crptography (8)
ii) Describe in detail about symmetric key distribution (8)
7. Explain in detail about distribution of public keys (16)
8.i)Perform encryption and Decryption using RSA
P=11 q=13 e=11 M=7 (10)
ii) Explain in detail about private key distribution (6)
9. i)Explain in detail about Elliptic curve Cryptography (8)
ii) Describe in about RSA Algorithm (8)
10. Explain in detail about following in detail with diagram
i) Public key cryptosystem Secrecy (5)ii) Public key cryptosystem Authentication (5)
iii)Public key cryptosystem Secrecy &authentication (6)
UNIT-IV
PART-A
1. Define the principle of fail-safe defaults
2. What is principle of Complete mediation?
3. Define the principle of Psychological Acceptability.
4. What is Access control list?
5. What is lock and Key Technique?
6. How the Internet handles identity conflict?
7. Differentiate static and dynamic identifiers.
8. Define Confinement problem
9. What is the use of sandboxes?
10. Define virtual machine
11. What is Capability list? Give an example
12. List the top ten OWASP Vulnerabilities
13. Define the information flow of an Assignment statement with example.
Prepared By : Dr.V.Dhanakoti
Page 4
UNIT-V
PART-A
1. What was the problem addressed by Kerberos?
2. In the context of Kerberos, what is a realm?
3. List three approaches to secure user authentication in a distributed environment
4. Why is R64 conversion useful for an email application?
5. Draw the Format of PGP Message
6. Why is the segmentation and reassembly function in PGP needed?
7. What is the utility of a detached signature?
8. What is the difference between an SSL Connection and SSL session?
9. What services are provided by the SSL Record Protocol?
10. What is the role of encryption in the operation of a virus?
11. List three design goals for a firewall.
12. What is circuit level gateway?
13. Differentiate rule-based anomaly detection and rule-based penetration identification?
14. Define honeypot.
15. What is the use of Trojan Horses?
16. List the three classes of Intruders.
17. What information is used by a typical packet-filtering route?
18. Define application gateway.
Prepared By : Dr.V.Dhanakoti
Page 5
Prepared By : Dr.V.Dhanakoti
Page 6