Professional Documents
Culture Documents
Subject:
QUESTION BANK
Computer System Security
UNIT I
1
What is the difference between passive and active security threats?
2
List and briefly define categories of security mechanisms.
3
Discuss any four substitution cipher encryption methods and list their merits and
demerits.
4
Explain simplified DES with example.
5
Write short notes on Steganography
6
Explain classical Encryption techniques in detail.
7
Write short notes on
(a) Security services
(b) Feistel cipher structure
8
What is the difference between a block cipher and a stream cipher?
9
What are the two general approaches to attacking a cipher?
10
Why do some block cipher modes of operation only use encryption while others use
both encryption
and decryption?
11
Why is the middle portion of 3DES a decryption rather than an encryption?
12
How AES is used for encryption/decryption? Discuss with example.
13
List the evaluation criteria defined by NIST for AES.
14
Briefly explain design principles of block cipher.
15
Discuss in detail block cipher modes of operation.
16
How are Diffusion and Confusion achieved in DES?
UNIT II
1
State and explain the principles of public key cryptography. (16)
2
Explain Diffie Hellman key Exchange in detail with an example (16)
3
Explain the key management of public key encryption in detail (16)
4
Explain RSA algorithm in detail with an example (16)
5
Briefly explain the idea behind Elliptic Curve Cryptosystem. (16)
6
User A and B exchange the key using Diffie-Hellman algorithm. q=11 XA=2 XB=3. Find
the value of YA,
YB and k?
7
Perform encryption and decryption using RSA Alg. for the following. P=7; q=11; e=17;
M=8.
8
What are the principal ingredients of a public-key cryptosystem?
AGPCE/CSE/2014-15
Page 1
QUESTION BANK
Computer System Security
UNIT III
1
2
3
4
5
6
7
8
9
UNIT IV
1
In the context of Kerberos, what is a realm?
2
What is the purpose of the X.509 standard?
3
How is an X.509 certificate revoked?
4
Define and explain Kerberos.
5
What 4 requirements were defined by Kerberos? In the content of Kerberos, what is
realm?
6
Assume the client C wants to communicate server S using Kerberos procedure. How can
it be achieved?
7
What is the purpose of X.509 standard?
8
Explain the classification of authentication function in detail (16)
9
Describe MD5 algorithm in detail. Compare its performance with SHA-1.
10
Describe SHA-1 algorithm in detail. Compare its performance with MD5 and RIPEMD160 and discuss
its advantages.
11
Describe RIPEMD-160 algorithm in detail. Compare its performance with MD5 and SHA1.
12
Describe HMAC algorithm in detail.
13
Write and explain the Digital Signature Algorithm.
14
What services are provided by the SSL Record Protocol?
15
What steps are involved in the SSL Record Protocol transmission?
16
What is the purpose of HTTPS?
AGPCE/CSE/2014-15
Page 2
QUESTION BANK
Computer System Security
For what applications is SSH useful? List and briefly define the SSH protocols.
UNIT V
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
UNIT VI
1
List the design goals of firewalls?
2
Explain in details firewall and describe any three types of firewall.
3
Write short notes on Intrusion Detection.
4
Describe trusted system in detail.
5
List four techniques used by firewalls to control access and enforce a security policy.
6
What are some weaknesses of a packet filtering firewall?
7
What is the difference between a packet filtering firewall and a stateful inspection
firewall?
AGPCE/CSE/2014-15
Page 3