IS-Assignments - WordPress.com

advertisement
GOVT. ENGG. COLLEGE, MODASA
COMPUTER ENGINEERING/INF. TECH. DEPT.
Sub:-Information Security (160702)
Assignments
Assignment-1
1> Explain Network Security Model.
2> Explain OSI Architecture. What do you understand by security attack, security mechanism and
security services?
3> What is the difference between substitution and transposition cipher?
4> How can Caesar cipher be cracked? And Why is mono-alphabetic cipher difficult to crack?
5> Explain one-time pad method.
6> Explain different types of attacks?
7> Define cryptology.
8> Differentiate between differential and linear cryptanalysis.
9> Define symmetric key encryption .
10> Distinguish between stream and block ciphers.
11> What is the difference between confusion and diffusion?
12> Explain the avalanche effect.
13> What is steganography? Give any two examples of the use of steganography.
14> What is Brute Force Attack?
15> What would be the transformation of a message “happy birth day to you” using
Rail Fence technique of depth 2?
16> Explain Vernam cipher.
17> Encrypt the message “Hello world” using Playfair cipher with key “star”.
Assignment-2
1> Explain S-DES algorithm in brief.
2> Explain different modes of operation.
3> Explain DES algorithm in brief.
4> Explain RC5 algorithm in brief.
5> Explain Rc2 Algorithm in brief.
6> Explain Cast-128 Algorithm in brief.
7> Explain Blowfish Algorithm in brief.
8> Explain Characteristics Of Advanced Symmetrical Block Cipher
9> Describe how to decrypt Cn-1 and Cn in RC5-CTS mode.
10> What is the idea behind meet-in-the-middle attack?
Assignment-3
1> Explain “The Euclidean Algorithm.” With example.
2> Explain “The Fermat’s Theorem.” With example.
3> Explain “The Euler’s Theorem” With example.
4> Explain Link versus End-End Encryption.
5> Explain Traffic Confidentiality.
6> Differentiate Session Key-Master Key.
7> Explain Key Distribution by KDC.
8> What is life time for session key?
9> Explain Principals of Public-key Encryption.
10> Explain Authentication and Confidentiality and how to maintain it by using public key algorithm.
11> Explain RSA Algorithm with Example.Using RSA algorithm p=7,a=11,e=17 and M=8 find
n,ø(n),d and pair of public key and private key.
12> Explain Distribution of Public keys.
13> Explain “Diffie-Hellman Key Exchange” Algorithm.
14> Write Down “Elliptic Curve Cryptography Key Exchange” Algorithm.
Assignment-4
1> Write Down Authentication Requirements.
2> Write Down Authentication Functions.
3> Write down difference between “Internal Error Control” and “External Error Control”.
4> What is MAC(Message Authentication Code)?Write down the basic uses of MAC.
5> What is Hash Function? Write down the basic uses of Hash Function.
6> Write down Requirements for Hash Function.
7> Explain “MD5- Message Digest Algorithm “in detail.
8> Explain “SHA-1” in detail.
9> Explain “RIPEMD-160” in detail.
10> Explain HMAC in detail.
Assignment-5
1>
2>
3>
4>
5>
6>
Explain “Digital Signature Standard(DSS)” in detail.
Explain different types of firewalls.
Explain Kerberos in detail
Explain IP Security Architecture.
What is Requirement of Web Security?
Explain Secure Socket Layer(SSL) And Transport Layer Security(TLS).
Download