X

14CS2008 Cryptography & Network Security B.Tech Question Bank : karunya.edu

Name of the College : Karunya Institute of Technology & Sciences
University : Karunya University
Degree : B.Tech
Department : Information Technology
Subject Name : Cryptography & Network Security
Document Type : Question Bank
Website : karunya.edu

Download :https://www.pdfquestion.in/uploads/ka…20Security.pdf

Karunya Cryptography & Network Security Question Paper

Part-A

1. Name the aspects to be considered of information security.
2. What is meant by deciphering?
3. What are the two different uses of public key cryptography related to key distribution?

Related : Karunya University 14MA2010 Discrete Mathematics B.Tech Question Bank : www.pdfquestion.in/2883.html

4. How many bit keys are used in S-DES algorithm?
5. Name the processing steps involved in MD5 logic?
6. What are the parameters are include the certificate request message?
7. What is S/MIME?
8. What is the purpose of dual signature?
9. What are the two common techniques used to protect a password file?
10. What are the req1.
11. What is the size of the key for substitution block cipher?
12. Define Stream Cipher.
13. What is convert channel?
14. Give the principle advantages of elliptical curve cryptography.
15. What are the counter measures for timing attach?
16. Give all the generic types of attacks.
17. How secure is DES?
18. What is the necessity of firewalls?
19. Between symmetric Vs Public Key cryptography, which method is more convenient?
20. What are the requirements of a hash function?

Part-B

21. Security threats can be categorized into _____________ & ____________.
22. Two kinds of threats can be presented by programs, they are ____________ &____________.
23. It is possible to provide _______ & _______________ by a double use of public key scheme.
24. A public key is denoted as ___________ & private key as ________________.
25. In context of communications across a network, the following attacks can be identified __________, __________, ___________ & __________________.
26. Simplest has function can be expressed as ___________________.
27. PGP provides a _______________ & _______________ services, that can be used for E-Mail and file storage application.
28. The five header fields defined in MIME are as follows : _____________ ,____________, ____________,_____________ & _______________.
29. ______________ & _______________ are the standardized schemes that are becoming increasingly important as part of Web Commerce.
30. SET incorporates the following features ________,_________,__________ & _____________.
31. What are symmetric and asymmetric encryptions?
32. What is the main advantage of AES over DES?
33. What is a nance?
34. What are public and private keys?
35. The addition operation in ECC is the counterpart of modular ___________ in RSA and multiple addition is the counterpart of modular ________________.
36. For what purpose the hash function is used?
37. What is Kerberos?
38. Where do you apply PGP?
39. Give application for Class I Veri Sign public key certificate.
40. The intruders are classified into __________, __________ and —————.
41. List out different active attacks.
42. Mention the drawback of Steganography.
43. List out the basic tasks in Public Key Encryption in key distribution.
44. Diffie-Hellman algorithm also supports Digital Signature application. Say True or False.
45. __________ provides a Centralized authentication Server whose function is to authenticate users to Servers and Servers to users.
46. Give an example for Simple Hash Function.
47. List out the two methods of operations in Authentication Header (AH) and Encapsulating Security Payload (ESP).
48. Enumerate the functions provided by S/MIME.
49. __________ infects a master boot record boot record and spreads when a system is booted
from the disk containing the virus.
50. List out the two ways in which password can be protected.
51. Which attack is related to integrity?
52. Most symmetric block ciphers are based on ___________ structure.
53. Which public key cryptosystem can be used for digital signature?
54. In asymmetric key cryptography ___________keys are required per user.
55. X .509 standards is used in ___________and ___________.
56. The length of message digest is ___________bits for SHA.
57. Expand : S/MIME.
58. What is the use of trusted system?
59. Give the methods for protecting the password file.
60. First version of TLS can be viewed as ___________.
61. Which attack is related to confidentiality?
62. __________ is used to verify the integrity of message.
63. In asymmetric key cryptography __________ keys are required per user.
64. SSL was originated by __________.
65. MAC function is __________ function.
66. The message digest length of MD5 algorithm is __________.
67. PGP finds its use in __________ and __________.
68. List the three different classes of intruders.
69. TLS working group was formed within __________.
70. What is the use of trusted system?

Part-C

71. Give the four kinds of security threats in the network.
72. Define Cryptanalysis.
73. What is meant by symmetric encryption?
74. Find the ‘n’ and ø(n) value in RSA if P = 7 and Q = 17.
75. Write the specific function of MAC in network security.
76. What type of encryption is used in CMAC authentication?
77. Define Hash function.
78. What are the properties of Digital Signature?
79. What is meant by SSL?
80. What is meant by Firewall?
81. What are the two basic functions used in encryption algorithms?
82. What is Steganography?
83. What is key distribution center?
84. What is the key size for Blowfish?
85. What is message authentication?
86. Define Kerberos.
87. What are the key algorithms used in S/MIME?
88. Give the application of IP security.
89. What is meant by SET?
90. List the design goals of firewalls.
91. What is Cryptanalysis?
92. Give the classification of active attacks.
93. List out the basic tasks in Public Key Encryption in key distribution.
94. What is Digital Signature?
95. Kerberos provides ________ whose function is to authenticate users to Servers and Servers to users.
96. Give the purpose of Hash Function.
97. List out different header fields defined in MIME.
98. Give different IPSec Services.
99. ________ infects a master boot record boot record and spreads when a system is booted from the disk containing the virus.
100. Classify Intrusion Detection approaches.
101. Define Network security.
102. What is meant by block cipher and stream cipher?
103. What is nonce?
104. What are the possible ways to distribute the public keys?
105. Write the need and mention the size of the hash buffer in SHA-512.
106. Write the features of Whirlpool.
107. What is PGP?
108. List out the functions of S/MIME.
109. What is change cipher spec protocol?
110. What are the key features of SET?
11 1. Two types of passive are attacks are ________ and ____________
112. A _________ is one that encrypts a digital data stream one bit or one byte at a time.
113. What is the use of public key encryption scheme?
114. What is an elliptic curve?
115. What is meant by CBC-MAC?
116. DSA means ____________.
117. List any two web security threats.
118. Define IPSec.
119. List any two design goals for a firewall.
120. SMTP means ______________.
121. Define Security Mechanism.
122. Give any two parameters and design choices that determine the actual algorithm of a Feistel cipher?
123. Identify the possible threats for RSA algorithm.
124. List out the general schemes for the distribution of public keys.
125. Is a 128-bit hash function (MD5) unsuitable for HMAC?
126. What are the areas where Kerberos Version 5 addresses the limitation of Version 4?
127. What is S/MIME?
128. Mention the protocols used by IPSec to provide security.
129. How are the passwords stored in password file in UNIX operating system?
130. Which system is used to protect credit card transactions on the internet?
131. Define Security Service.
132. What is meant by Block Cipher?
133. Define Plain Text.
134. What are the three broad categories of applications of Public Key cryptosystems?
135. Which block size and key size are used in the whirlpool Block Cipher?
136. List out any two design objectives of HMAC.
137. What are the fields in the Authentication Header?
138. Why does Encapsulating Security Payload include a padding field?
139. What is the main service of secure socket layer?
140. What is meant by a Secure Electronic Transaction?

Tags: karunya.edu
Jency:
www.pdfquestion.in © 2022 Contact Us   Privacy Policy   Site Map