Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
34 views

Assignment IS

Assignment questions for Information security.

Uploaded by

pushtibhatt924
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Assignment IS

Assignment questions for Information security.

Uploaded by

pushtibhatt924
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

K.J.

INSTITUTE OF ENGINEERING & TECHNOLOGY- SAVLI


ASSIGNMENT- 2024
INFORMATION SECURITY (3170720)
SEMESTER-7TH
DEPARTMENT- CE

Assignment-1
1. List and explain different types of attacks.
2. Explain Caesar cipher algorithm with the help of example.
3. List and explain different mode of operation used for encryption and decryption.
4. Explain following terms: non-repudiation, integrity, masquerade
5. E xplain playfair cipher. Encrypt the plain-text message “helloe jassmin” using
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any ‘j’ in the
plaintext is replaced by ‘i’.)
6. Define the following terms related to Information Security: i. Cryptography ii.
Cryptanalysis iii. Sniffing iv. Spoofing v. Interception vi. Fabrication vii. Masquerade
7. Write a note on Advanced Encryption Standard(AES).
8. Define the following terms: (i) Security Attack (ii) Security Services (iii) Security
Mechanism

ASSIGNMENT SUBMISSION DATE: __________

Total assignment submitted in Computer Engineering:

Prof. Kinjal Bhagariya Prof. Ajay Baria

Assistant Professor ( HOD)

CE & IT DEPT CE & IT DEPT


K.J. INSTITUTE OF ENGINEERING & TECHNOLOGY- SAVLI
ASSIGNMENT- 2024
INFORMATION SECURITY (3170720)
SEMESTER-7TH
DEPARTMENT- CE

Assignment-2
1. Explain DES encryption.
2. List and explain possible attacks on DES.
3. Explain key generation of RSA algorithm
4. Write Euclid algorithm.
5. Explain man-in-the middle attack on Diffie-Hellman key exchange.
6. Explain RSA algorithm in detail. Perform encryption and decryption using RSA
algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
7. Discuss Meet-in-the-Middle Attack

ASSIGNMENT SUBMISSION DATE: __________

Total assignment submitted in Computer Engineering:

Prof. Kinjal Bhagariya Prof. Ajay Baria

Assistant Professor ( HOD)

CE & IT DEPT CE & IT DEPT


K.J. INSTITUTE OF ENGINEERING & TECHNOLOGY- SAVLI
ASSIGNMENT- 2024
INFORMATION SECURITY (3170720)
SEMESTER-7TH
DEPARTMENT- CE

Assignment-3

1. List basic uses of Hash function.


2. Draw message digest generation using SHA 512 algorithm.
3. Discuss Cipher Block Chaining (CBC) modes of operation with the help of diagram.
4. Discuss Cipher Feedback (CFB) block cipher modes of operation with the help of
diagram.
5. Differentiate between Block Cipher and Stream Cipher.
6. What are the requirements for a Cryptographic Hash Function?
7. Explain with the diagrams Basic Uses of Message Authentication code (MAC).

ASSIGNMENT SUBMISSION DATE: __________

Total assignment submitted in Computer Engineering:

Prof. Kinjal Bhagariya Prof. Ajay Baria

Assistant Professor ( HOD)

CE & IT DEPT CE & IT DEPT


K.J. INSTITUTE OF ENGINEERING & TECHNOLOGY- SAVLI
ASSIGNMENT- 2024
INFORMATION SECURITY (3170720)
SEMESTER-7TH
DEPARTMENT- CE

Assignment-4

1. Discuss the security of digital signature.


2. List and explain various key distribution approach of symmetric key cryptography.
3. Define Digital signature. Explain digital signature algorithm.
4. Explain various general categories of schemes for the distribution of public keys.
5. Discuss briefly the working of KERBEROS authentication protocol.
6. Discuss X.509 authentication service.
7. What is the role of AS and TGS in Kerberos?
8. Explain SSL Architecture with neat diagram.

ASSIGNMENT SUBMISSION DATE: __________

Total assignment submitted in Computer Engineering:

Prof. Kinjal Bhagariya Prof. Ajay Batia

Assistant Professor ( HOD)

CE & IT DEPT CE & IT DEPT

You might also like