0% found this document useful (0 votes)
68 views2 pages

CNS Question Bank (1-5)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

CNS Question Bank (1-5)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ANJUMAN COLLEGE OF ENGINEERING & TECHNOLGY, SADAR, NAGPUR.

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

ACADEMIC SESSION 2023-2024

CNS QUESTION BANK


1. Draw and explain internetwork security model.
2. What do you understand by attacks related to the cryptography with an example.
3. What are the cryptographic attacks? Explain in detail with their categories and sub-classification by
illustrating suitable diagram.
4. Explain how “NETWORK SECURITY” with key=2 can be encrypted using ceaser cipher.

5. Encrypt the message "Money helps to build infrastructure" using Hill cipher with the key
Show your calculations and result.
6. Find the cipher text for the message ‘Friday’ using hill cipher with the key

Show your calculations and results


7. Explain how the string ‘MY NAME IS ATUL’ can be encrypted using playfair cipher with key
“PLAYFAIR EXAMPLE”.
8. Distinguish between block cipher and stream cipher by giving example.
9. Explain blowfish in detail.
10. Explain RC4 in detail.
11. Using suitable diagram differenciate between Double DES and Triple DES.
12. Explain the key generation process in AES.
13. Describe key generation of AES algorithm.
14. Describe fermat’s little theorem.
15. Describe Chinese Reminder theorem.
16. Explain Euclidian algorithm and state its purpose also.
17. What is MAC? Explain its need and types.
18. Explain Kerberos version 4 in detail.
19. Explain Kerberos version-4 with its dialogue in detail.

20. Describe the basic requirement of Kerberos. Explain steps of Kerberos version4 in details.
21. How can be Kerberos is used in network? Explain in details.

22. Explain Applications and advantages of IP Sec


23. Draw and explain IPSEC model
24. Explain IP Sec in details.
25. Explain X-509 digital certificate (directory) format
26. Explain RSA algorithm in details. Perform encryption and decryption p = 17; q = 11; e = 7; M = 88.
27. Write steps of RSA algorithm. In RSA system, the public key of a given user is e=31, n=3599. What is
the private key of this user?
28. Write R.S.A. Algorithm. Also perform encryption and decryption using RSA for following values P = 5,
q = 11, e = 3 & M = 9.
29. In a public key cryptosystem using RSA. Ciphertext C = 10 sent to user whose public key is e=5, n = 35
what is the plaintext? Also write steps of RSA.
30. Explin how the string ‘HELLO WORLD’ can be encrypted using RSA for p=3, q=11. Give encrypted
output.
31. Describe Diffie-Hellman key exchange Algorithm with suitable example. What are the weakness of the
Algorithm explain.
32. Explain steps involved in Diffie Hellman Algorithm and calculate K for n= 11; g=7;x=3;y=6 using the
same.
33. What is Woman in Middle attack/ Bucket attack in detail. Also differenciate between this and Man in
middle attack.
34. What is ECC? Explain in detail.
35. Explain Diffie Hellman key exchange algorithm. Clearly mention the weaknesses of this algorithm

36. Write a short note on Hash function? Give the basic uses of hash function
37. What is hash and hash function? Explain with suitable example.
38. What do you mean by key distribution? Describe key distribution scenario.
39. Explain the digital signature requirements and direct digital signature in detail.
40. Explain Authentication and Digital Signature in brief.
41. Explain authentication requirement.
42. What do you mean by MD? Explain MD5 in detail.
43. What do you mean by message digest? Explain MD 5 in details with the help of neat diagram.
44. Explain SHA in detail.
45. State and explain PGP in detail.
46. Explain Firewall? Explain it in detail with its types.
47. Explain different firewall configurations.
48. Explain VPN.
49. Draw and explain SSL stack format in brief
50. Explain SSL & its handshake.
51. Discuss about SSL stack and handshake protocol in details.
52. Explain in detail pretty good privacy.

53. What do you mean by "Intrusion Detection system" and provide prevention schemes?

You might also like