You are on page 1of 4

NETWORK SECURITY UNIT 1 1 2 3 4 Define Cryptosystem. Explain it with suitable diagram.

Explain the following terms: i)Encryption ii)Decryption iii)Ciphers iv)Cryptanalysis What are ciphers? What is the difference between Transposition Cipher and Substitution Cipher? Define Monoalphabetic and polyalphabetic cipher. State whether following ciphers are monoalphabetic or polyalphabetic: i. Vigenere cipher ii. Affine cipher iii. Autokey cipher iv. Shift key cipher Write a short note on :Affine cipher/Hill Cipher/Vernam cipher/permutation cipher What is cryptanalysis? Discuss different cryptanalysis attack. Explain the concept of public key and Private key used in cryptography. What is the advantage of having two separate keys? Compare between Symmetric cryptography and Asymmetric Cryptography. Explain the concept of Symmetric Cryptography in detail. Explain the concept of Asymmetric Cryptography in detail Explain in detail RSA algorithm. What is Euclidean theorem? Explain it with suitable example. What is Chinese Remainder theorem? Explain. What are the different modes of DES? Explain any one in detail Problems: Use an affine cipher to encrypt the word android with the key pair(5,2) Encryption key for permutation cipher is (5 6 1 3 7 4 2 ).Find the decryption key and decrypt the following ciphertext: IOMSNSIOSCRIIUCCTSEUYLZSFZUS Use the vigenere cipher with keyword HEALTH to encipher the message,Life is full of surprises

5 6 7 8 9 10 11 12 13 14

1 2

Unit 2 1 2 3 4 5 6 7 8 9 What is Digital Signature? Explain the concept in detail. Write a short note on ElGamal Signature Scheme. What is Message digest? Explain its importance. Define Hash function. Discuss security of Hash functions. Explain in detail Birthday attack. Explain the following terms: i)Key Predistribution ii)session key distribustion iii) key agreement Explain in detail Diffie-Hellman key exchange algorithm. Discuss Bloms key predistribution scheme. State the Algorithm for One- Time Signature Scheme.

Unit 3 1 2 3 4 5 6 Define Computer Security. Explain the necessity of computer security. Explain in detail OSI security Architecture. What are passive attacks? Discuss various passive attacks. What are active attacks? Discuss various passive attacks. Differentiate between active and passive attacks. Explain both these types of attacks giving an example of each. What are security services? Explain the following security services: i)Authentication ii)Data integrity Explain the following terms: i)Authentication ii)Access Control iii)Non-Repudiation 8 9 10 11 12 13 14 State and Explain various security mechanisms. Differentiate between Passive attack & active attack. List & explain the categories of security mechanism of x.800. List & explain the categories of security services of x.800. Describe OSI security architecture. What are the problems of computer security mechanism? Describe CIA Triad of computer security.

15 Explain Network security model. Unit 4 1 2 3 4 What are three threats associated with user authentication over a network? What four requirements were defined for Kerberos? Discuss X.509 Authentication service. In PGP, explain how Bob and Alice exchange the secret key for encrypting messages. 5 6 Explain the general format of PGP message. In S/MIME, explain how Bob and Alice exchange the secret key for encrypting messages 7 8 Write a short note on S/MIME functionality. Write short note on Kerberos

Unit 5 1 2 3 4 5 6 7 8 9 10 11 What services are provides by IPsec? Explain Transport and Tunnel mode. Write a short note on ESP. What are the applications of IP security? What are the benefits / advantages of IP security? What are the groups of IP security document? What is the role of IPSec in routing application? Describe transport mode & tunnel mode. How do IPSec maintain it policy in applications? What parameters identify an SA & what parameters characterize the nature of SA? What is the concept of IP Security Association in IPSec?

12 13 14 15 16 17 18 19 20

What are the attributes of Security Association database? Describe ESP packet format Describe anti-relay attack / service. Compare transport mode / tunnel mode of IP. Explain the term: Security Association Bundle. Explain the protocols supported in Transport mode & Tunnel mode. What are the basic combinations of Security Association? Explain IPSec key management. What is the concept of IKE? What are its features? Explain IKE header format?

Unit 6 1 2 3 4 What is a firewall? Explain the necessity of firewall. What is packet filter firewall? Explain. What is Application Level Gateway? Explain its working. What are advantages and disadvantages of Application Level Gateway? How is it different from circuit level gateway and packet filter firewall? 5 6 7 8 9 10 11 12 13 14 What is DMZ? Explain the importance of DMZ. What is malicious software? Classify it. What is a virus? Explain in detail lifecycle of a virus. What is a virus? Discuss different types of viruses. How viruses are different from worms and Trojan horses? Explain the structure of a virus. What is DOS? How DOS is different from DDOS? Write a short note on Intrusion Detection System. What is Intrusion Detection System? How IDS is different from firewall? Explain different types of Intrusion Detection System.

You might also like