Q.
NO QUESTION MARKS SECTION UNIT
1. Explain the concept of principle of security in Cyber
12 Section-I 1
security with examples.
2. Let message = “CRYPTOGRAPHY”, Ignore the space
between words. Keyword = “MRUH”, find cipher-text 12 Section-I 1
using playfair cipher.
3. Discuss examples from real life, where the following
security objectives are needed:
12 Section-I 1
a) Confidentiality b) Integrity c) Non-repudiation.
Suggest suitable security mechanisms to achieve them.
4. Encrypt the message “I AM INDIAN” using Caesar cipher
with key = 15. Ignore the space between words. Decrypt 12 Section-I 1
the message to get the Original plaintext.
5. a) Explain about Substitution Techniques with examples?
(6M)
12 Section-I 1
b) Differentiate Substitution Techniques and
Transposition Techniques? (6M)
6. Summarize about Security Approaches in network
12 Section-I 1
security?
7. Explain active and passive attack with example. 12 Section-I 1
8. Define steganography? Discuss the role of steganography
in augmenting the corporation's security posture, 12 Section-I 1
including practical applications and potential challenges.
9. What is the role of Key Range and Key Size of different
12 Section-I 1
types of ciphers? Explain it with examples.
10. What do you mean by cryptography? Explain following
basic terms with example. 12 Section-I 1
a) Plain Text b) Cipher Text c) Encryption d) Decryption
11. Explain following Algorithm Modes with example:
a) Electronic Code Book (ECB)
b) Cipher Block Chaining (CBC) 12 Section-II 2
c) Cipher Feedback (CFB)
d) Output Feedback (OFB).
12. Explain following Algorithm Types with example:
a) Block Cipher 12 Section-II 2
b) Stream Cipher
13. What do you mean by DES? Diagrammatically illustrate
the structure of DES & describe the steps in DES 12 Section-II 2
encryption process with example.
14. With an example, explain the encryption and key
12 Section-II 2
schedule operations of AES.
15. Describe International Data Encryption (IDEA)
algorithm with its Key generation, encryption and its 12 Section-II 2
applications in Cyber security world.
16. Calculate the cipher text with Knapsack weight value
D=1, 2, 4,10,20,40 and Plain Text value 100100 111100 12 Section-II 2
101110.
17. What are different block cipher algorithms? Explain each
algorithm with a suitable diagram and also present the 12 Section-II 2
pros and cons of each algorithm.
18. Write a short notes on Differential and Linear
12 Section-II 2
Cryptanalysis.
19. Explain about Blowfish Algorithm with focus on Key
12 Section-II 2
generation and Encryption and Decryption process.
20. Explain the encryption and key generation modes of
12 Section-II 2
operations of IDEA with suitable example.
21. Differentiate Asymmetric and Symmetric Key
12 Section-III 3
cryptography with suitable parameters.
22. Explain the concept of RSA Algorithm. Describe Security
12 Section-III 3
Analysis of RSA.
23. Write and explain the Digital Signature Algorithm 12 Section-III 3
24. Illustrate the working of MD-5. List out difference
12 Section-III 3
between MD5 and MD4.
25. Describe the advantages and disadvantages of symmetric
12 Section-III 3
and asymmetric-key cryptography.
26. Write a short notes on Secure Hash Algorithm. 12 Section-III 3
27. Define Public Key Infrastructure (PKI) and explain its
role in ensuring secure communication on the internet.
12 Section-III 3
How does PKI utilize digital certificates for
authentication and encryption?
28. Explain the PKIX model and its significance in
12 Section-III 3
establishing trust relationships within a PKI ecosystem.
29. Compare and contrast SSL with Secure Hypertext
Transfer Protocol (SHTTP) in terms of security 12 Section-III 3
mechanisms, compatibility, and adoption.
30. Discuss the purpose and functionality of the Time
Stamping Protocol in ensuring the integrity and
authenticity of digital documents. How does time 12 Section-III 3
stamping contribute to non-repudiation in electronic
transactions?
31. Compare and contrast Secure Socket Layer (SSL) and
Secure Electronic Transaction (SET) protocols in terms of
12 Section-IV 4
their security features and suitability for different types
of online transactions.
32. What is the purpose of Public Key Infrastructure (PKI) in
12 Section-IV 4
the context of digital certificates?
33. Describe the role of XML (eXtensible Markup Language)
in PKI and security. How is XML utilized in the
12 Section-IV 4
representation and exchange of security-related
information in web-based applications?
34. Provide an overview of basic concepts in Internet
Security Protocols. What are the primary objectives of
12 Section-IV 4
these protocols, and how do they contribute to securing
online communication?
35. Explain the Secure Socket Layer (SSL) protocol and its
role in providing secure communication over the
12 Section-IV 4
internet. Discuss the key features, components, and
handshake process of SSL.
36. Discuss the role of 3-D Secure Protocol in enhancing the
12 Section-IV 4
security of online card payments.
37. What are Public Key Cryptography Standards (PKCS), and
how do they standardize cryptographic operations
12 Section-IV 4
within a PKI environment? Provide examples of
commonly used PKCS standards and their applications.
38. Explain Digital Certificate Creation Steps with suitable
12 Section-IV 4
diagram.
39. What do you mean by Private Key Management? Explain
12 Section-IV 4
Mechanisms for protecting private keys
40. Critically assess the security implications of using crypto
currencies like Bitcoin in online transactions,
12 Section-IV 4
considering factors such as anonymity, decentralization,
and regulation.
41. Explain the authentication standards Kerberos with
12 Section-V 5
suitable diagram.
42. Define the term "password authentication" and explain
12 Section-V 5
its basic process.
43. What are the security implications of implementing
biometric authentication systems? How can these 12 Section-V 5
systems be protected against attacks and misuse?
44. What are the fundamental concepts of authentication,
12 Section-V 5
and why is it essential in information security?
45. Discuss the role and types of Firewall for organization
12 Section-V 5
level with suitable diagram.
46. Explain the concept of authentication tokens. What are
the different types of authentication tokens, and how do 12 Section-V 5
they enhance security?
47. Describe the process of two-factor authentication (2FA).
How does it enhance security compared to traditional 12 Section-V 5
password-based authentication?
48. Explain the role of E-mail Security. How PGP will help for
12 Section-V 5
E-mail security.
49. What is IP Security? Give brief note on IPSec Key
12 Section-V 5
Management.
50. Write a short Notes on:
a) Virtual Private Networks 12 Section-V 5
b) Intrusion Detection