ANNA UNIVERSITY M.E. (CSE) - Second Semester NETWORK SECURITY QUESTION BANK
Question Bank
M.E. (CSE) - Second Semester
NETWORK SECURITY
UNIT-I
PART-A
What are active attacks? How is it classified?
Differentiate cryptography and Stegnography with an example.
Mention the mechanism implemented by the confidentiality and traffic flow confidentiality services.
What is meant by services?
Define the following terms (a) Stream cipher (b) Block cipher.
Differentiate between mono alphabetic cipher and a poly alphabetic cipher.
What is meant by transpositional techniques?
What are the types of security threats?
Define decryption.
Define Ceaser cipher.
What is private key?
Define cipher text.
List and briefly define categories of security mechanism.
Differentiate between active attack and passive attack.
Write a note on playfair cipher.
Why it is important to study the Feistal cipher?
Distinguish between diffusion and confusion.
PART-B
1. What is meant by cryptanalysis? What are the types of cryptanalytic attacks and the amount of information known to cryptanalyst? What are the features of these attacks?
2. Discuss in detail about the classical encryption techniques.
3. Explain about model for network security.
4. Explain about encryption algorithms.
5. Compare and contrast substitution and transposition ciphers. Explain one method in each category.
6. How simplified DES scheme is used for encryption/decryption? Discuss.
7. Why DES algorithm is implemented? Explain in detail about the function about DES and compare it with simplified DES.
UNIT-II
PART-A
1.Specify the application of public key cryptography.
2.What is the purpose of S-boxes in DES?
3.How is S-box constructed?
4.Distinguish between stream and block ciphers.
5. List three classes of polynomial arithmetic.
6. Define plain text.
7. Differentiate between plain text and cipher text.
8. List out the types of cryptographic functions.
9. What is Elliptic curve cryptography?
10. Differentiate between public key encryption versus conventional encryption.
11. Define authentication.
12. What is modular arithmetic?
13. Define Euler’s theorem.
14. Mention the four possible approaches to attack the RSA algorithm.
15. Write the purpose of Diffie –Hellman Key Exchange.
16. What is a public key certificate?
PART-B
1. How is RSA algorithm used in encryption/Decryption? Discuss with example.
2. Explain in detail about distribution of public key and secret key.
3. Explain the concept of multiple encryptions with an example.
4. What are the requirements for public key cryptography? What are the issues in public key cryptanalysis?
5. Explain in brief about Elliptic Curve cryptography.
6. Describe about groups, rings, modular arithmetic and finite field.
UNIT-III
PART-A
1. What are the requirements of a hash functions.
2. Illustrate denial of service. Give an example.
3. What are the properties of a hash function used in message authentication.
4. Compare SHA-1 and MD5 algorithm.
5. What is meant by message digest?
6. List out the design objectives for HMAC.
7. What are the three classes of message authentication functions?
8. What is the need for mutual authentication protocol?
9. What are the requirements of digital signature?
10. List out the properties of digital signature.
11. What are the key requirements of message digests?
12. Draw the diagram of TCP segment.
13. What is meant by brute force attack?
14. Define birthday attack.
15. What is web security?
16. Define CMAC.
PART-B
1. Explain simple hash function with example?
2. How hash functions are used in message authentication? Discus in detail about
simple hash functions and block chaining techniques.
3. Explain the MD-5 and SHA-1 hashing functions with an example.
4. Explain the digital signature algorithm with example and its application.
5. What are the different types of arbitrated digital signatures? Explain their operation and other features.
6. Describe HMAC algorithm.
7.Explian in detail about authentication function.
UNIT-IV
PART-A
1. List out the reasons for using PGP.
2. Why e-mail compatibility function in PGP needed?
3. What is e-mail?
4. Mention any two applications of IP security.
5. Give the benefits of IP security.
6. Specify the IP security services.
7. What are the two aspects of key management in IPSec?
8. Write the functions of S/MIME.
9. What is IP spoofing?
10. State the properties of digital signature.
11. What is meant by session key component?
12. Write about the benefits of IP security.
13. Define SSL connection.
14. What is Kerberos?
15. Write the four notation for PGP.
16. What are the uses of KDC?
17. List out the header fields in MIME.
18. What are the address formats used in e-mail.?
PART-B
1.Briefly discuss about SSL architecture and SSL record protocol.
2.Explain the transmission and reception of PGP messages, with relevant flowcharts, in detail.
3.Explain about ESP format and transport modes of ESP.
4.Explain the implementation of IPSec in detail.
5.How is secure electronic transaction implemented? Explain.
6.Explain in detail about key management in IP Security.
7.Describe about Secure Electronic Transaction.
UNIT-V
PART-A
1.What are the design goals of firewalls?
2.List out the limitations of firewall.
3.List out the current standards.
4.Write replay attack with an example.
5.What is trusted system? How is it useful?
6.What is the use of trusted system.
7.What is meant by tiny fragment attack? How can it be defeated?
8.Mention the principle of a packet filtering type of firewall.
9.List out the configuration of firewall.
10.What is an encrypted tunnel?
11.List and briefly define three classes of intruder.
12.Draw the diagram of agent architecture.
13.What are the two common techniques used to protect a password file?
14.List out the four basic techniques for password selection strategies.
15.What is a honey pot?
PART-B
1. What are the characteristics and capabilities of firewalls? Explain the types of firewalls.
2. Explain in detail about internet infrastructure security.
3. Discuss in detail about the concepts of trusted systems and data access control.
4. Explain in detail about prevention of Denial of Service attacks.
5. Illustrate, with necessary diagrams, three common firewall configurations.
Question Bank
M.E. (CSE) - Second Semester
NETWORK SECURITY
UNIT-I
PART-A
What are active attacks? How is it classified?
Differentiate cryptography and Stegnography with an example.
Mention the mechanism implemented by the confidentiality and traffic flow confidentiality services.
What is meant by services?
Define the following terms (a) Stream cipher (b) Block cipher.
Differentiate between mono alphabetic cipher and a poly alphabetic cipher.
What is meant by transpositional techniques?
What are the types of security threats?
Define decryption.
Define Ceaser cipher.
What is private key?
Define cipher text.
List and briefly define categories of security mechanism.
Differentiate between active attack and passive attack.
Write a note on playfair cipher.
Why it is important to study the Feistal cipher?
Distinguish between diffusion and confusion.
PART-B
1. What is meant by cryptanalysis? What are the types of cryptanalytic attacks and the amount of information known to cryptanalyst? What are the features of these attacks?
2. Discuss in detail about the classical encryption techniques.
3. Explain about model for network security.
4. Explain about encryption algorithms.
5. Compare and contrast substitution and transposition ciphers. Explain one method in each category.
6. How simplified DES scheme is used for encryption/decryption? Discuss.
7. Why DES algorithm is implemented? Explain in detail about the function about DES and compare it with simplified DES.
UNIT-II
PART-A
1.Specify the application of public key cryptography.
2.What is the purpose of S-boxes in DES?
3.How is S-box constructed?
4.Distinguish between stream and block ciphers.
5. List three classes of polynomial arithmetic.
6. Define plain text.
7. Differentiate between plain text and cipher text.
8. List out the types of cryptographic functions.
9. What is Elliptic curve cryptography?
10. Differentiate between public key encryption versus conventional encryption.
11. Define authentication.
12. What is modular arithmetic?
13. Define Euler’s theorem.
14. Mention the four possible approaches to attack the RSA algorithm.
15. Write the purpose of Diffie –Hellman Key Exchange.
16. What is a public key certificate?
PART-B
1. How is RSA algorithm used in encryption/Decryption? Discuss with example.
2. Explain in detail about distribution of public key and secret key.
3. Explain the concept of multiple encryptions with an example.
4. What are the requirements for public key cryptography? What are the issues in public key cryptanalysis?
5. Explain in brief about Elliptic Curve cryptography.
6. Describe about groups, rings, modular arithmetic and finite field.
UNIT-III
PART-A
1. What are the requirements of a hash functions.
2. Illustrate denial of service. Give an example.
3. What are the properties of a hash function used in message authentication.
4. Compare SHA-1 and MD5 algorithm.
5. What is meant by message digest?
6. List out the design objectives for HMAC.
7. What are the three classes of message authentication functions?
8. What is the need for mutual authentication protocol?
9. What are the requirements of digital signature?
10. List out the properties of digital signature.
11. What are the key requirements of message digests?
12. Draw the diagram of TCP segment.
13. What is meant by brute force attack?
14. Define birthday attack.
15. What is web security?
16. Define CMAC.
PART-B
1. Explain simple hash function with example?
2. How hash functions are used in message authentication? Discus in detail about
simple hash functions and block chaining techniques.
3. Explain the MD-5 and SHA-1 hashing functions with an example.
4. Explain the digital signature algorithm with example and its application.
5. What are the different types of arbitrated digital signatures? Explain their operation and other features.
6. Describe HMAC algorithm.
7.Explian in detail about authentication function.
UNIT-IV
PART-A
1. List out the reasons for using PGP.
2. Why e-mail compatibility function in PGP needed?
3. What is e-mail?
4. Mention any two applications of IP security.
5. Give the benefits of IP security.
6. Specify the IP security services.
7. What are the two aspects of key management in IPSec?
8. Write the functions of S/MIME.
9. What is IP spoofing?
10. State the properties of digital signature.
11. What is meant by session key component?
12. Write about the benefits of IP security.
13. Define SSL connection.
14. What is Kerberos?
15. Write the four notation for PGP.
16. What are the uses of KDC?
17. List out the header fields in MIME.
18. What are the address formats used in e-mail.?
PART-B
1.Briefly discuss about SSL architecture and SSL record protocol.
2.Explain the transmission and reception of PGP messages, with relevant flowcharts, in detail.
3.Explain about ESP format and transport modes of ESP.
4.Explain the implementation of IPSec in detail.
5.How is secure electronic transaction implemented? Explain.
6.Explain in detail about key management in IP Security.
7.Describe about Secure Electronic Transaction.
UNIT-V
PART-A
1.What are the design goals of firewalls?
2.List out the limitations of firewall.
3.List out the current standards.
4.Write replay attack with an example.
5.What is trusted system? How is it useful?
6.What is the use of trusted system.
7.What is meant by tiny fragment attack? How can it be defeated?
8.Mention the principle of a packet filtering type of firewall.
9.List out the configuration of firewall.
10.What is an encrypted tunnel?
11.List and briefly define three classes of intruder.
12.Draw the diagram of agent architecture.
13.What are the two common techniques used to protect a password file?
14.List out the four basic techniques for password selection strategies.
15.What is a honey pot?
PART-B
1. What are the characteristics and capabilities of firewalls? Explain the types of firewalls.
2. Explain in detail about internet infrastructure security.
3. Discuss in detail about the concepts of trusted systems and data access control.
4. Explain in detail about prevention of Denial of Service attacks.
5. Illustrate, with necessary diagrams, three common firewall configurations.