The document contains previous year questions for a Computer Science Security (CSS) examination, organized into six chapters covering topics such as introduction to number theory, block ciphers, cryptographic hashes, digital signatures, system security, and web security. Each chapter includes various questions related to security mechanisms, encryption techniques, authentication protocols, and vulnerabilities. The questions range in marks from 5 to 10, indicating their complexity and depth.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
18 views3 pages
CSS Previous Year Questions
The document contains previous year questions for a Computer Science Security (CSS) examination, organized into six chapters covering topics such as introduction to number theory, block ciphers, cryptographic hashes, digital signatures, system security, and web security. Each chapter includes various questions related to security mechanisms, encryption techniques, authentication protocols, and vulnerabilities. The questions range in marks from 5 to 10, indicating their complexity and depth.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
CSS PREVIOUS YEAR QUESTIONS
CHAPTER NO 1 : INTRODUCTION AND NUMBER THEORY
1. Define the security Mechanisms and attacks for OSI security architecture (5M). 2. List different poly-alphabetic substitution ciphers. Use Hill cipher to encrypt the text "short". The key to be used is "hill.(10M) 3. Describe steganography with example (5m). 4. Explain hill cipher with suitable example (10m) 5. Describe services and mechanisms(5m). 6. What is keyed and keyless transposition ciphers?(5m) 7. Use the playfair cipher with the keyword “example” to encipher “The algorithm name is playfair cipher(10m). 8. List different poly-alphabetic substitution ciphers. Encrypt "The key is hidden under the door" using playfair cipher with keyword "domestic"(10m) 9. Explain with examples, keyed and keyless transposition ciphers(5m).
CHAPTER N0 2: BLOCK CIPHERS AND PUBLIC KEY CRYPTOGRAPHY
1. Explain the different modes of block ciphers(5m). 2. Explain DES algorithms in detail(10m)
6. Explain DES algorithm with reference to following points: 1)Block size and key size 2)Need of expansion permutation 3) Role of S-box 4. Possible attacks on DES(10m). 7. Explain the different modes of block ciphers.(5m) 8. User A and B want to use RSA to communicate securely. A chooses public key as (7, 119) and B chooses public key as (13, 221). Calculate their private keys. A wishes to send message m = 10 to B. Produce the ciphertext. Formulate the key using which A encrypt the message "m" if A need to authenticate itself to B.(10m) 9. What is need of Diffie-Hellman algorithm. User A and B decide to use Diffie-Hellman algorithm to share a key. They choose p = 23 and g = 5 as the public parameters. Their secret keys are 6 and 15 respectively. Compute the secret key that they share.(10m) 10. Explain Triple DES in short(5m)
CHAPTER NO 3 : CRYPTOGRAPHIC HASHES, MSG DIGEST AND DIGITAL CERTIFICATES
1. Differentiate between Digital signature and digital certificate(5m) 2. Explain MD-5 hash function. Compare with SHA 256.(10m) 3. Write a note on digital certificate : x.509 and public key infrastructure .(10m) 4. Write properties of hash functions (5m) 5. Short note on X.509(5m) 6. What are properties of hash function? Compare MD-5 and SHA hash algorithm(10m) 7. Why digital signature and digital certificates are required?(5m) 8. List and explain characteristics needed in secure hash function(5m) 9. Give the format of X.509 digital certificate and explain the use of a digital signature in it.(10m) 10. Differentiate MD5 and SHA-1 algorithms(5m)
CHAPTER NO 4: DIGITAL SIGNATURE SCHEME AND AUTHENTICATION PROTOCOLS
1. Explain various authentication protocols detail.(10M)
2. Define digital signature. P =7 and Q=17 are two prime numbers. If E=5 as public key, find the cipher text for 5. Also decrypt the cipher text back to get plain text(10M) 3. Explain Needham Schroeder Authentication protocol.(10M) 4. What is digital signature ? why digital signature is required ?(5m) 5. What do you understand by digital signatures and digital certificates? Explain digital signature scheme RSA(10m) 6. Define digital signature. Explain any digital signature algorithm in detail.(10m)
CHAPTER NO 5: SYSTEM SECURITY
1. List various types of security that are applied on database(5M)
2. List and explain in detail security features of operating system(10M) 3. List and explain security requirements of a website(10M) 4. List and explain different velnerabilities in operating system ?(5m) 5. What are database security requirments? What do you understand by inference attacks? Explain about multilevel database security (10m) 6. Explain memory and address protection in detail. Write a note on file protection.(10m) 7. Briefly explain database security. What do you understand by multilevel database security.(10m) 8. List with examples the different mechanisms to achieve security(5m) 9. List and explain security requirements of database(5m) 10. Explain memory and address protection in detail. Write a note on file protection(10m) 11. List and explain vulnerabilities in windows operating system.(5m)
CHAPTER NO 6: WEB SECURITY
1. Define wed security. Explain the role of cookies. (5M)
2. Explain the different types of firewalls and layer in which it operate(5M) 3. Explain the role of SSH. What is the difference between HTTP and HTTPS(10M) 4. Explain Penetration testing in detail(10M) 5.Explain web security in detail (10m) 6. Explain penetration testing (5m) 7. Explain clickjacking and session hijacking.(5m) 8. Enlist various functions of protocols of SSL. Explain the phases of handshake protocol.(10m) 9 . short note on Web browser attacks(5m) DNS attack (5m) Email attack (5m) 11. Explain phishing and list different types of phishing techniques(5m) 12. List the functions of the different protocols of SSL. Explain the handshake protocol(10m) 13. Explain session hijacking and management.(10m) 14. Explain the different types of firewalls and mention the layer in which they operate(5m)
Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE): - A comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, Graph-Theory, Routing and the change from Mix-Networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol