Está en la página 1de 2

Sub: CRYPTOGRAPHY AND NETWORK SECUTITY

Question Bank
Chapter 1
1. Descrbe securty approaches?
2. Descrbe prncpes of securty?
Chapter 2
1. Dene cryptography .cryptanayss and cryptoogy?
2. Dene pan text and cpher text?
3. Descrbe varous substtuton technques?
4. Descrbe varous transposton technques?
5. Descrbe varous types of attacks?
6. Dene Encrypton and Decrypton?
7. What do you mean by symmetrc and asymmetrc key cryptography?
Chapter 3
8. Dene agorthm types and modes?
9. Descrbe the concepts of Confuson and Dhuson.
10. Wrte down four mportant agorthm modes and descrbe ECB
mode?
11. Descrbe cpher bock channg mode?
12. Descrbe cpher feedback mode?
13. Descrbe output feedback mode?
14. Wrte advantages and dsadvantages of a the four modes?
15. Descrbe n deta Data Encrypton Standard (DES)?
16. Descrbe n deta IDEA (Internatona Data Encrypton
Agorthm)?
Chapter 4
17. Descrbe n deta RSA agorthm?
18. Compare symmetrc v/s asymmetrc key cryptography?
19. How symmetrc and asymmetrc key cryptography can be used
together for better resut?
20. Dene Message Dgest (MD). Expan t wth sutabe exampe.
What are the dherent requrements of a MD?
21. Descrbe knapsack probem?
Chapter 5
22. What s a dgta certcate? Dene certcaton authorty
(CA).How dgta certcate are created?
23. How does the CA sgn a Dgta certcate? How can we verfy a
Dgta certcate ?
24. Descrbe varous mechansms for protectng prvate keys?
25. Descrbe varous PKI servces?
26. Descrbe the foowng
I. Password based encrypton (PBE) standard.
II. Prvate key nformaton syntax standard.
III. Certcate request syntax standard.
IV. Cryptographc token nterface standard.
V. Persona nformaton exchange syntax.
VI. Pseudo random number generaton standard.
VII. Cryptographc token nformaton syntax standard.
Chapter 6
27. Descrbe Secure Socket Layer (SSL) protoco .Aso menton the
poston of SSL n TCP/IP protoco sute?
28. Descrbe Secure Hyper Text Transfer Protoco (SHTTP) .Aso
menton the poston of SHTTP n TCP/IP protoco sut.
29. Dene Secure Eectronc Transacton (SET).Wrte dherence
servces provded by SET?
30. Descrbe varous partcpants n the SET system?
31. Descrbe dherent steps nvoved n the SET process?
32. Compare SSL and SET Protocos?
Chapter 7
33. Dene securty handshake ptfas. Descrbe one way
authentcaton.
34. Descrbe (two way) mutua authentcaton.
Re!e"en#e Books:
1. Cryptography and Network Securty
By Atu Kahate, TATA McGraw HILL
2. Cryptography and Network Securty Prncpes and Practces,
By Wam Stangs, Prentce Ha(Fourth
Edton )

También podría gustarte