0% found this document useful (0 votes)
18 views3 pages

CSS Previous Year Questions

The document contains previous year questions for a Computer Science Security (CSS) examination, organized into six chapters covering topics such as introduction to number theory, block ciphers, cryptographic hashes, digital signatures, system security, and web security. Each chapter includes various questions related to security mechanisms, encryption techniques, authentication protocols, and vulnerabilities. The questions range in marks from 5 to 10, indicating their complexity and depth.

Uploaded by

Suchit Jundare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

CSS Previous Year Questions

The document contains previous year questions for a Computer Science Security (CSS) examination, organized into six chapters covering topics such as introduction to number theory, block ciphers, cryptographic hashes, digital signatures, system security, and web security. Each chapter includes various questions related to security mechanisms, encryption techniques, authentication protocols, and vulnerabilities. The questions range in marks from 5 to 10, indicating their complexity and depth.

Uploaded by

Suchit Jundare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CSS PREVIOUS YEAR QUESTIONS

CHAPTER NO 1 : INTRODUCTION AND NUMBER THEORY


1. Define the security Mechanisms and attacks for OSI security architecture (5M).
2. List different poly-alphabetic substitution ciphers. Use Hill cipher to encrypt the text
"short". The key to be used is "hill.(10M)
3. Describe steganography with example (5m).
4. Explain hill cipher with suitable example (10m)
5. Describe services and mechanisms(5m).
6. What is keyed and keyless transposition ciphers?(5m)
7. Use the playfair cipher with the keyword “example” to encipher “The algorithm name
is playfair cipher(10m).
8. List different poly-alphabetic substitution ciphers. Encrypt "The key is hidden under
the door" using playfair cipher with keyword "domestic"(10m)
9. Explain with examples, keyed and keyless transposition ciphers(5m).

CHAPTER N0 2: BLOCK CIPHERS AND PUBLIC KEY CRYPTOGRAPHY


1. Explain the different modes of block ciphers(5m).
2. Explain DES algorithms in detail(10m)

5. Explain Diffie hellman key exchange algorithm.(10m)


6. Explain DES algorithm with reference to following points: 1)Block size and key size
2)Need of expansion permutation 3) Role of S-box 4. Possible attacks on DES(10m).
7. Explain the different modes of block ciphers.(5m)
8. User A and B want to use RSA to communicate securely. A chooses public key as (7,
119) and B chooses public key as (13, 221). Calculate their private keys. A wishes to send
message m = 10 to B. Produce the ciphertext. Formulate the key using which A encrypt
the message "m" if A need to authenticate itself to B.(10m)
9. What is need of Diffie-Hellman algorithm. User A and B decide to use Diffie-Hellman
algorithm to share a key. They choose p = 23 and g = 5 as the public parameters. Their
secret keys are 6 and 15 respectively. Compute the secret key that they share.(10m)
10. Explain Triple DES in short(5m)

CHAPTER NO 3 : CRYPTOGRAPHIC HASHES, MSG DIGEST AND DIGITAL CERTIFICATES


1. Differentiate between Digital signature and digital certificate(5m)
2. Explain MD-5 hash function. Compare with SHA 256.(10m)
3. Write a note on digital certificate : x.509 and public key infrastructure .(10m)
4. Write properties of hash functions (5m)
5. Short note on X.509(5m)
6. What are properties of hash function? Compare MD-5 and SHA hash algorithm(10m)
7. Why digital signature and digital certificates are required?(5m)
8. List and explain characteristics needed in secure hash function(5m)
9. Give the format of X.509 digital certificate and explain the use of a digital signature
in it.(10m)
10. Differentiate MD5 and SHA-1 algorithms(5m)

CHAPTER NO 4: DIGITAL SIGNATURE SCHEME AND AUTHENTICATION PROTOCOLS

1. Explain various authentication protocols detail.(10M)


2. Define digital signature. P =7 and Q=17 are two prime numbers. If E=5 as public
key, find the cipher text for 5. Also decrypt the cipher text back to get plain
text(10M)
3. Explain Needham Schroeder Authentication protocol.(10M)
4. What is digital signature ? why digital signature is required ?(5m)
5. What do you understand by digital signatures and digital certificates? Explain
digital signature scheme RSA(10m)
6. Define digital signature. Explain any digital signature algorithm in detail.(10m)

CHAPTER NO 5: SYSTEM SECURITY

1. List various types of security that are applied on database(5M)


2. List and explain in detail security features of operating system(10M)
3. List and explain security requirements of a website(10M)
4. List and explain different velnerabilities in operating system ?(5m)
5. What are database security requirments? What do you understand by inference
attacks? Explain about multilevel database security (10m)
6. Explain memory and address protection in detail. Write a note on file
protection.(10m)
7. Briefly explain database security. What do you understand by multilevel
database security.(10m)
8. List with examples the different mechanisms to achieve security(5m)
9. List and explain security requirements of database(5m)
10. Explain memory and address protection in detail. Write a note on file
protection(10m)
11. List and explain vulnerabilities in windows operating system.(5m)

CHAPTER NO 6: WEB SECURITY

1. Define wed security. Explain the role of cookies. (5M)


2. Explain the different types of firewalls and layer in which it operate(5M)
3. Explain the role of SSH. What is the difference between HTTP and HTTPS(10M)
4. Explain Penetration testing in detail(10M)
5.Explain web security in detail (10m)
6. Explain penetration testing (5m)
7. Explain clickjacking and session hijacking.(5m)
8. Enlist various functions of protocols of SSL. Explain the phases of handshake
protocol.(10m)
9 . short note on Web browser attacks(5m)
DNS attack (5m)
Email attack (5m)
11. Explain phishing and list different types of phishing techniques(5m)
12. List the functions of the different protocols of SSL. Explain the handshake
protocol(10m)
13. Explain session hijacking and management.(10m)
14. Explain the different types of firewalls and mention the layer in which they
operate(5m)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy