How To Exam?

a knowledge trading engine...


Vinayaka Missions University 2010 B.E Information Technology Cryptography and network security - Question Paper

Wednesday, 22 May 2013 07:50Web

VMKV ENGINEERING COLLEGE
DEPARTMENT OF info TECHNOLOGY
SEMESTER VI
ques. BANK
CRYPTOGRAPHY AND NETWORK SECURITY

UNIT I
PART A
1. When does an encryption scheme is stated to be unconditionally secure cipher and computationally secure cipher?
2. Draw a simplified network security model.
3. Mention the 2 issues associated with one-time pad.
4. Write the 2 basic functions used encryption algorithms.
5. How many keys are needed for 2 people to communicate via a cipher?
6. Differentiate ranging from a block cipher and a stream cipher.
7. Why is it important to study Feistel cipher?
8. Specify the difference ranging from diffusion and confusion.
9. Which parameters and design options determine the true algorithm of a Feistel cipher?
10. What is the purpose of the S-boxes in DES?
11. List out the essential ingredients of a symmetric cipher.
12. What is the difference ranging from differential and linear cryptanalysis
13. How many bytes in State are affected by Shift Rows?
14. Differentiate ranging from Sub Bytes and Sub Word.
15. Define meet-in-the-middle attack.
16. How many keys are used in triple encryption?
17. Why do a few block cipher modes of operation only use encryption while others
use both encryption and decryption?
18. Write the difference ranging from link and end-to-end encryption.
19. How is the S-box constructed?
20. List a few important design considerations for a stream cipher.
21. Write a note on mix columns.
22. What kinds of info might be derived from a traffic analysis attack?
23. Define traffic padding and write its purpose?
24. List out the original set of criteria used by NIST to evaluate candidate AES
Cipher.
25. For a user workstations in a typical business environment, list potential locations
for confidentiality attacks.

PART B
1. Illustrate the basic approaches to symmetric encryption and the kinds of attacks.
2. Discuss any 4 substitution cipher encryption methods and list their merits and demerits.
3. Illustrate with examples the different classical encryption techniques.
4. Why DES algorithm is implemented? discuss in detail about the function about DES and compare it with simplified DES.
5. Explain with necessary diagrams about key management, encryption and decryption in Simplified DES.
6. Describe about Traffic Confidentiality and placement of encryption functions.
7. Discuss the classification of security services in detail.
8. Illustrate with neat diagrams the block cipher design principles and modes of operation.
9. With necessary flowchart discuss how DES algorithm is implemented.
10. Draw the model for network security and discuss every in detail.
UNIT II
PART A

1. List the ways in which secret keys can be distributed to 2 communicating parties.



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Vinayaka Missions University 2010 B.E Information Technology Cryptography and network security - Question Paper