g2tech.110mb.com
IT1352: Cryptography and Network Security
UNIT I - INTRODUCTION
PART-A
1. What are the essential ingredients of a symmetric cipher?
2. What are the two basic functions used in encryption algorithms?
3. How many keys are required for two people to communicate via a cipher?
4. What is the difference between a block cipher and a stream cipher?
5. What are the two approaches to attacking a cipher?
6. What is the difference between an unconditionally secure cipher and a computationally secure
cipher?
7. Briefly define the Caesar cipher.
8. Briefly define the monoalphabetic cipher?
9. Briefly define the playfair cipher.
10. What are the two problems with one-time pad?
11. What is a transposition cipher?
12. What is Steganography?
13. Why is it important to study feistel cipher?
14. Why is it not practical to use an arbitrary reversible substitution cipher?
15. What is the difference between diffusion and confusion?
16. Which parameters and design choices determine the actual algorithm of a feistel cipher?
17. What is the purpose of the S-boxes in DES?
18. Explain the avalanche effect.
19. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher?
20. List the types of cryptanalytic attacks.
PART-B
1. Explain the OSI Architecture. (16)
2. Explain Classical Encryption Techniques. (16)
1
G2tech Education
g2tech.110mb.com
IT1352: Cryptography and Network Security
PART-B
1. Explain about the various Key management techniques. (16)
2. Describe Diffie-Hellman Key Exchange. (16)
3. Explain RSA algorithm. (8)
4. Describe Public Key Cryptography. (8)
5. Explain Elliptic Curve Architecture. (16)
2
G2tech Education
g2tech.110mb.com
IT1352: Cryptography and Network Security
PART-B
1. Explain Authentication Functions. (16)
2. Briefly Explain HMAC algorithm. (8)
3. Describe RIPEMD-160. (16)
4. Explain Hash Functions. (16)
5. Explain Digital Signature Standard. (8)
6. Briefly explain about MD5 algorithm? (8)
7. Briefly describe about the Secure Hash Algorithm? (8)
8. Explain authentication protocol (8)
3
G2tech Education
g2tech.110mb.com
IT1352: Cryptography and Network Security
PART – B
1. Define Kerberos Version 4.(16)
2. Define Kerberos Version 5.(16)
3. Explain briefly about X.509 Authentication Service.(16)
4. Discuss about the concept of Electronic Mail Security.(16)
5. Define S/MIME.(8)
6. Discuss briefly about IP Security.(16)
7. Explain with elaborate about the Web Security Considerations.(16)
8. Explain briefly about the Secure Electronic Transaction.(16)
9. Explain in detail about the IP Security Architecture(16)
10. Explain in detail about the Authentication Header.(16)
11. Discuss briefly about Pretty Good Privacy.(8)
4
G2tech Education
g2tech.110mb.com
IT1352: Cryptography and Network Security