Network Security and Cryptography
HNBGU MCA Previous Question Paper 2022


Define "CIA triad" of security. Explain, how it ensures the
security of information owned by an organization.

Differentiate between "Cryptanalyst" and "Attacker" List and
explain the various types of cryptanalytic attacks.


What is a "Monoalphabetic cipher"? Explain the encryption
and decryption algorithm of Playfair cipher.

What is the difference between a "Stream cipher" and "Block
cipher" ? Explain the Fiestal structure of a Block cipher.


How are Sub Keys are generated in IDEA algorithm? Explain in
details.

What is "Key Distribution"? Explain the types of asymmetric
key distribution.


State "Euler's Theorem" and "Euler totient function".
Calculate 3^503 mod 11 using Euler's theorem.

State "Fermat's Theorem". Explain the steps involved in
Primality testing.


What is "Digital Signature"? Explain digital signature
approch using Digital Signature Standard (DSS).

How does a birthday attack on a hashing algorithm work?
Explain.


What is Secure Hash Algorithm (SHA)? With block diagram,
explain how the Hash code is generated in SHA512 Algorithm.

Explain the working of round functions in MD5 algorithm. HOw
the authentication and integrity of data is achieved using
MD5 algorithm?


Explain IP security architecture in detail. What are the
services provided by IP security?

How the authentication is achieved using handshake protocol
in SSL? Explain?


What is Secure Electronic Transaction (SET) ? How is SET
implemented? Explain in details.

Write short notes on the following:
 Intrusion Detection
 Metamorphic virus
 Firewall Basing
 DDos