You are on page 1of 3

ABHA GAIKWAD-PATIL COLLEGE OF ENGINEERING, NAGPUR

Subject:

QUESTION BANK
Computer System Security
UNIT I

1
What is the difference between passive and active security threats?
2
List and briefly define categories of security mechanisms.
3
Discuss any four substitution cipher encryption methods and list their merits and
demerits.
4
Explain simplified DES with example.
5
Write short notes on Steganography
6
Explain classical Encryption techniques in detail.
7
Write short notes on
(a) Security services
(b) Feistel cipher structure
8
What is the difference between a block cipher and a stream cipher?
9
What are the two general approaches to attacking a cipher?
10
Why do some block cipher modes of operation only use encryption while others use
both encryption
and decryption?
11
Why is the middle portion of 3DES a decryption rather than an encryption?
12
How AES is used for encryption/decryption? Discuss with example.
13
List the evaluation criteria defined by NIST for AES.
14
Briefly explain design principles of block cipher.
15
Discuss in detail block cipher modes of operation.
16
How are Diffusion and Confusion achieved in DES?

UNIT II
1
State and explain the principles of public key cryptography. (16)
2
Explain Diffie Hellman key Exchange in detail with an example (16)
3
Explain the key management of public key encryption in detail (16)
4
Explain RSA algorithm in detail with an example (16)
5
Briefly explain the idea behind Elliptic Curve Cryptosystem. (16)
6
User A and B exchange the key using Diffie-Hellman algorithm. q=11 XA=2 XB=3. Find
the value of YA,
YB and k?
7
Perform encryption and decryption using RSA Alg. for the following. P=7; q=11; e=17;
M=8.
8
What are the principal ingredients of a public-key cryptosystem?

AGPCE/CSE/2014-15

Page 1

ABHA GAIKWAD-PATIL COLLEGE OF ENGINEERING, NAGPUR


Subject:

QUESTION BANK
Computer System Security

UNIT III
1
2
3
4
5
6
7
8
9

What are the requirements for message authentication?


What you meant by hash function?
Differentiate MAC and Hash function?
What is the role of compression function in hash function?
What is the difference between weak and strong collision resistance?
Compare MD5, SHA1 and RIPEMD-160 algorithm.
Distinguish between direct and arbitrated digital signature?
List ways in which secret keys can be distributed to two communicating parties.
What is a key distribution center?

UNIT IV
1
In the context of Kerberos, what is a realm?
2
What is the purpose of the X.509 standard?
3
How is an X.509 certificate revoked?
4
Define and explain Kerberos.
5
What 4 requirements were defined by Kerberos? In the content of Kerberos, what is
realm?
6
Assume the client C wants to communicate server S using Kerberos procedure. How can
it be achieved?
7
What is the purpose of X.509 standard?
8
Explain the classification of authentication function in detail (16)
9
Describe MD5 algorithm in detail. Compare its performance with SHA-1.
10
Describe SHA-1 algorithm in detail. Compare its performance with MD5 and RIPEMD160 and discuss
its advantages.
11
Describe RIPEMD-160 algorithm in detail. Compare its performance with MD5 and SHA1.
12
Describe HMAC algorithm in detail.
13
Write and explain the Digital Signature Algorithm.
14
What services are provided by the SSL Record Protocol?
15
What steps are involved in the SSL Record Protocol transmission?
16
What is the purpose of HTTPS?
AGPCE/CSE/2014-15

Page 2

ABHA GAIKWAD-PATIL COLLEGE OF ENGINEERING, NAGPUR


Subject:
17

QUESTION BANK
Computer System Security

For what applications is SSH useful? List and briefly define the SSH protocols.

UNIT V
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17

Give examples of applications of IPsec.


What services are provided by IPsec?
What is the difference between transport mode and tunnel mode?
What is a replay attack?
Why does ESP include a padding field?
General format of IPsec ESP Format?
What is Authentication Header? Give the format of the IPsec Authentication Header?
Define Transport Adjacency and Iterated Tunnel?
What are two common techniques used to protect a password file?
What are three benefits that can be provided by an intrusion detection system?
What metrics are useful for profile-based intrusion detection?
List the steps involved in SSL record protocol?
Give SSL record format?
What is mean by SET? What are the features of SET?
What are the steps involved in SET Transaction?
Define virus. Specify the types of viruses?
Differentiate Transport and Tunnel mode in IPsec?

UNIT VI
1
List the design goals of firewalls?
2
Explain in details firewall and describe any three types of firewall.
3
Write short notes on Intrusion Detection.
4
Describe trusted system in detail.
5
List four techniques used by firewalls to control access and enforce a security policy.
6
What are some weaknesses of a packet filtering firewall?
7
What is the difference between a packet filtering firewall and a stateful inspection
firewall?

AGPCE/CSE/2014-15

Page 3

You might also like