0% found this document useful (0 votes)
133 views5 pages

ISS Assi 1-5 Ques

This document outlines an assignment for an Information Security Systems course, providing the name of the student, course details, learning outcomes, and 5 units of study with sets of questions for each unit related to cryptography, encryption algorithms, digital signatures, hashing, and network security protocols. The assignment is to be completed and submitted to the instructor, Mr. Abhishek Gupta, for evaluation and grading.

Uploaded by

Nupoor Bomb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views5 pages

ISS Assi 1-5 Ques

This document outlines an assignment for an Information Security Systems course, providing the name of the student, course details, learning outcomes, and 5 units of study with sets of questions for each unit related to cryptography, encryption algorithms, digital signatures, hashing, and network security protocols. The assignment is to be completed and submitted to the instructor, Mr. Abhishek Gupta, for evaluation and grading.

Uploaded by

Nupoor Bomb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Geetanjali Institute of Technical Studies, Udaipur

Department of CSE

ASSIGNMENT RECORD

Name :-
Roll No:-
Year/Semester/Section:-IIIYear/VISemester/Section A and B
Branch:- Computer Science and Engg.
Session:-Even Semester 2019-2020
Subject Name:-Information Security System
Subject Code:- 6CS4-03
Subject Teacher:-Mr Abhishek Gupta
Assistant Professor,CSE
Geetanjali Institute of Technical Studies, Udaipur
Department of CSE
Even Sem. 2019-2020
6CS4-03– Information Security System
Assignment Front Page
Name of Student RTU Roll No.
Submitted To: Mr. Abhishek Gupta

Evaluation Sheet:
S. Unit Question Max Marks Dateof CO MAPPED SIGN
No. Number Marks Obtained Submission
1 5
1 I CO36403.1
2 5
1 5
2 II CO36403.2
2 5
1 5
2 III CO36403.3
2 5
1 5
4 IV CO36403.4
2 5
1 5
5 V CO36403.5
2 5

Overall
Grade:………………………
Signature:
ASSIGNMENT
UNIT –I
Questions

Set 1

Ques 1: (i) Differentiate between cryptography, cryptology and cryptanalysis.


(ii) Write short note on substitution and transposition techniques
Ques 2: Explain Hill Cipher with example.

Set II
Ques 3: Explain information security goals in detail.
Ques 4: Explain Playfair Substitution Technique with example.
Set III

Ques 5: Discuss cryptography. Explain block and stream cipher in detail.


Ques 6: Explain the key principles of security with suitable example.

UNIT –II

Questions

Set I

Ques 1: Explain the different Block Cipher mode of operation in details.


Ques 2: Explain Data Encryption Standard (DES) in detail.
Set II
Ques 3: Explain the importance of one-time initialization process. Describe each steps of AES algorithm.

Ques 4: Explain triple DES in detail.


Set III
Ques 5: Explain design principle of block cipher.

Ques 6: Write short note on strength of DES.

UNIT –III
Questions
Set I

Ques 1: Explain Elliptic curve cryptosystem in detail.


Ques 2: Explain RSA in detail with security analysis of RSA.

Set II
Ques 3: Explain Rabin Cryptosystem in detail.
Ques 4: Perform Encryption and Decryption using RSA algorithm.
(i) P = 5, Q = 11, E = 3, M = 7
(ii) P = 11, Q = 13, E = 11, M = 7
(iii) P = 3, Q = 11, E = 7, M = 5
Set III
Ques 5: State and explain the principles of public key cryptography
Oues 6: Explain Elgamal cryptosystem in detail.

UNIT –IV
Questions

Set I

Ques 1: Describe the Digital signature. Show how signing and verification is done using DSS
(Digital Signature Standard)
Ques 2: Explain secure Hash function with SHA algorithm.
Set II

Ques 3: Explain MD5 Message digest algorithm with its logic and compression function.
Ques 4: What is Message Authentication code (MAC)? Explain types of MAC in detail.

Set III

Ques 5: What is the difference between Hash and MAC? Discuss the methods of accomplish the
confidentiality and authentication using MAC and Has

Ques 6: Explain NIST digital signature algorithm in detail.

UNIT –V
Questions

Set I
Ques 1: What entities constitute a full-service Kerberos environment.
Ques 2: Explain X.509 authentication service.
Set II
Ques 3: Write short note on:
(i) HTTPS
(ii) SSH

Ques 4: Explain different types of web security threats in detail.


Set III
Ques 5: 1. Describe the following scheme for distribution of public keys:
(i) Public key authority
(i) Public key certificate

Ques 6: Explain SSL Architecture in detail.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy