Network Security and Cryptography
HNBGU MCA Previous Question Paper 2022
-
-
Define "CIA triad" of security. Explain, how it ensures the
security of information owned by an organization.
-
Differentiate between "Cryptanalyst" and "Attacker" List and
explain the various types of cryptanalytic attacks.
-
-
What is a "Monoalphabetic cipher"? Explain the encryption
and decryption algorithm of Playfair cipher.
-
What is the difference between a "Stream cipher" and "Block
cipher" ? Explain the Fiestal structure of a Block cipher.
-
-
How are Sub Keys are generated in IDEA algorithm? Explain in
details.
-
What is "Key Distribution"? Explain the types of asymmetric
key distribution.
-
-
State "Euler's Theorem" and "Euler totient function".
Calculate 3^503 mod 11 using Euler's theorem.
-
State "Fermat's Theorem". Explain the steps involved in
Primality testing.
-
-
What is "Digital Signature"? Explain digital signature
approch using Digital Signature Standard (DSS).
-
How does a birthday attack on a hashing algorithm work?
Explain.
-
-
What is Secure Hash Algorithm (SHA)? With block diagram,
explain how the Hash code is generated in SHA-512 Algorithm.
-
Explain the working of round functions in MD5 algorithm. HOw
the authentication and integrity of data is achieved using
MD5 algorithm?
-
-
Explain IP security architecture in detail. What are the
services provided by IP security?
-
How the authentication is achieved using handshake protocol
in SSL? Explain?
-
-
What is Secure Electronic Transaction (SET) ? How is SET
implemented? Explain in details.
-
Write short notes on the following:
- Intrusion Detection
- Metamorphic virus
- Firewall Basing
- DDos