UNIT-1
1.Define a Security attack.
Explain in detail about the various types of attacks an Internetwork is
vulnerable to.
2.Compare
and contrast all kinds of cipher techniques in the cryptography?
3.Describe
the following
|
||
(a)
|
Security
attacks
|
|
(b)
|
Security
services
|
|
(c)
|
Security
mechanisms
|
|
4.Compare
and contrast active and passive attacks?
5.Define
Information Security and explain its significance in today’s world. Also
clearly bring out the meaning of the following related terms: Computer
Security, Network Security and Internet Security with relevant examples.
6. Discuss the following terms in detail with relevant
examples:
a. Interruption ii.
Interception iii. Modification iv. Fabrication
7. Explain the different types of security attacks,
security services and mechnasims?
8. Discuss Network security model with neat illustration
and explain the components of the model.
9. Explain the substitution techniques a) Ceaser Cipher
b) Play Fair Cipher c) Hill Cipher
10.
Explain the transposition technique.
11. Compare and contrast between Cryptography and
Cryptology
12. Write about OSI Security Architecture
13. Define steganography?
14.Write
Short Notes On Viruses & Worms
UNIT-2
With a neat block diagram
explain the DES algorithm?
Differentiate
Differential and Linear Cryptanalysis,
Explain
Blowfish algorithm , encryption , decryption
3.
With neat illustration explain Advanced
Encryption Standard algorithm (AES).
4.
Write short notes on: (a) Location of
encryption devices (b) Fiestel cipher structure
5.
Differentiate between DES and AES
algorithms.
6.
Enumerate the various cipher block modes
of operation.
7.
Explain the various Key distribution
methods
8.
Explain the structure of the Conventional
Public-key encryption with relevant illustrations.
9.
Describe the approaches of key
distribution in public key cryptosystems
10.
Explain RSA Algorithm
11. Explain about Diffie Hellman Key Exchange
Explain
RC4 Location?