0% found this document useful (0 votes)
4 views4 pages

Medium Level

The document outlines various topics related to security in communication systems, including the need for security, principles of security, types of attacks, cryptographic techniques, and key management. It covers symmetric and asymmetric key ciphers, cryptographic hash functions, transport-level security, wireless network security, email security, and IP security. Additionally, it discusses case studies on cryptography and security, emphasizing the importance of secure communication in modern technology.

Uploaded by

sanjanamaroju82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views4 pages

Medium Level

The document outlines various topics related to security in communication systems, including the need for security, principles of security, types of attacks, cryptographic techniques, and key management. It covers symmetric and asymmetric key ciphers, cryptographic hash functions, transport-level security, wireless network security, email security, and IP security. Additionally, it discusses case studies on cryptography and security, emphasizing the importance of secure communication in modern technology.

Uploaded by

sanjanamaroju82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT-01

1. Explain the need for security in modern communication systems. Provide real-world
examples.
2. Discuss any four principles of security and how they help in building a secure system.
3. Differentiate between passive and active attacks with suitable examples.
4. What are the major security services? Explain any three in detail.
5. Illustrate and explain the model for network security.
6. Compare and contrast any two security approaches: Layered security, Perimeter security,
or Hybrid approach.
7. Define plaintext and ciphertext. Describe the encryption and decryption processes.
8. What is the difference between substitution and transposition techniques? Provide one
example for each.
9. Explain symmetric and asymmetric key cryptography with suitable diagrams.
10. Describe the concept of steganography. How is it different from traditional cryptography?
11. Discuss the importance of key size and key range in securing encrypted communication.
12. Explain any four types of cryptographic attacks. Suggest countermeasures where
applicable.
UNIT-02
Symmetric Key Ciphers
1. What are the basic principles of block cipher design? Explain with a suitable example.
2. Explain the architecture and working of the Data Encryption Standard (DES) with a neat
diagram.
3. Compare DES and AES in terms of block size, key size, and security features.
4. Describe the structure of AES. How does it ensure confidentiality in data transmission?
5. Write short notes on any two of the following symmetric key algorithms:
o Blowfish

o RC5

o IDEA

6. Explain the different modes of block cipher operation (ECB, CBC, CFB, OFB). Provide
use cases.
7. Differentiate between block ciphers and stream ciphers. Provide suitable examples.
8. Describe the working of RC4 algorithm. What are its applications and limitations?
🔸 Asymmetric Key Ciphers

9. Explain the principles of public key cryptosystems. How do they differ from symmetric
key systems?
10. Describe the RSA algorithm with an example. Explain key generation, encryption, and
decryption.
11. What is Diffie-Hellman key exchange? Explain the process of establishing a shared
secret.
12. Write short notes on any two of the following asymmetric key algorithms:
 ElGamal Cryptography
 Knapsack Algorithm
 RSA Security Analysis
UNIT-03
Cryptographic Hash Functions & Authentication
1. What is a message authentication code (MAC)? Explain its purpose and applications in
secure communication.
2. Explain the working of the HMAC algorithm with an example. How does it enhance
message security?
3. Compare HMAC and CMAC. In which scenarios would one be preferred over the other?
4. Describe the Secure Hash Algorithm (SHA-512). What are its key features and output
characteristics?
5. What are the authentication requirements in network security? Explain with examples.
6. Define and explain the role of digital signatures in message authentication. How do they
ensure integrity?
7. Describe the ElGamal Digital Signature Scheme. How does it differ from ElGamal
encryption?

🔸 Key Management & Distribution

8. Discuss the challenges of key distribution in symmetric cryptosystems. How are these
challenges addressed?
9. Explain the process of symmetric key distribution using asymmetric encryption. Provide
an example.
10. What is the role of Kerberos in secure authentication? Explain its architecture and
ticketing process.
11. What is the X.509 Authentication Service? How is it used in public key infrastructure
(PKI)?
12. Describe the structure and functions of a Public Key Infrastructure (PKI). Why is it
essential in cybersecurity?
UNIT-04
Transport-Level Security
1. What are the major web security considerations when designing secure online
applications?
2. Explain the architecture and working of the Secure Socket Layer (SSL).
3. Discuss the role and features of Transport Layer Security (TLS). How is it different from
SSL?
4. Explain the process of establishing an HTTPS connection. How does it ensure secure
communication?
5. Compare SSL, TLS, and HTTPS in terms of security and usage.
6. What is SSH (Secure Shell)? Explain how it provides confidentiality, integrity, and
authentication.

🔸 Wireless Network Security

7. What are the key threats to wireless network security? Explain any two in detail.
8. Describe the security features implemented in IEEE 802.11 Wireless LAN.
9. Explain the IEEE 802.11i standard. How does it improve security over previous wireless
LAN standards?
10. What are the challenges in securing mobile devices? List and explain any two techniques
used.
11. Compare Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
12. Explain any three methods to secure a wireless network against unauthorized access.
UNIT-05
E-Mail Security
1. What is Pretty Good Privacy (PGP)? Explain how it ensures email confidentiality and
integrity.
2. Describe the structure and working of Secure/Multipurpose Internet Mail Extensions
(S/MIME). How is it used in secure email communication?
3. Compare PGP and S/MIME in terms of key management, authentication, and
compatibility.

🔸 IP Security (IPSec)

4. What is IP Security (IPSec)? Explain its need and where it is applied in the network
stack.
5. Describe the architecture of IPSec. What are its main components and how do they
function together?
6. Explain the purpose and format of the Authentication Header (AH) in IPSec.
7. What is the Encapsulating Security Payload (ESP) in IPSec? How does it differ from
AH?
8. Discuss how multiple Security Associations (SAs) can be combined in IPSec. Provide an
example scenario.
9. Explain the Internet Key Exchange (IKE) protocol. How does it contribute to secure key
management in IPSec?

🔸 Case Studies on Cryptography and Security

10. What is Secure Multiparty Computation (SMPC)? Explain with an example use case like
virtual elections.
11. Explain how Single Sign-On (SSO) works. What are its advantages and security risks?
12. What is Cross-site Scripting (XSS)? Describe its types and suggest any two prevention
techniques.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy