Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
11 views

IS_Assignment

IS assignment

Uploaded by

piyush sadhu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

IS_Assignment

IS assignment

Uploaded by

piyush sadhu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IS (3170720) Semester: VII

Apollo Institute of Engineering and Technology (121)


Branch: CE
Subject: Information Security

Assignment - 1

1) Explain CIA (Confidentiality, Integrity, and Availability).


2) List and briefly define categories of Passive and active security attacks.
3) List and briefly define categories of Security Services.
4) List and briefly define categories of Security Mechanisms.
5) Define Cryptography and Cryptanalysis. Draw and explain Symmetric cipher model.

6) From keyword MONARCHY and OCCURRENCE create play fair matrix and encrypt
plaintext = “ATTACK ON PAKISTAN”.
7) Encrypt the message “GTU Examination” using the Hill cipher algorithm with the key
matrix 5 17 Show your calculations and the result.
4 15
8) Using the Vigenère cipher, encrypt the word “ATTACKATDAWN” using the key
“LEMON”.
9) Explain Columnar Transposition Cipher and Rectangular Transposition with example.
10) Differentiate Substitution and Transposition Techniques.

Assignment - 2

1) Write Difference between following: (i) block cipher and stream cipher
(ii) Confusion and Diffusion

2) Answer following questions.


i) Total number of s-box used in DES is_________.
ii)Why it is important to study Feistal cipher?
iii) Explain avalanche effect.
iv) How many AES rounds are required for 192-bit key size?
v) How many expanded key words for 128 – bit key size?
vi) How many bytes in state are affected by shift rows?

3) Draw block diagram to show Broad level steps in DES and also give steps of one
round in DES with another diagram.

4) Discuss the Design principles of block cipher.


5) Briefly explain the AES encryption structure and discuss its transformation functions.

Assignment – 3

1. What is multiple encryption and Triple DES?


2. Explain in detail the electronic code book ECB?
3. What is the formula for cipher block chaining?
4. How is cipher feedback mode different from cipher block chaining mode?
5. What is the difference between output feedback and cipher feedback?

Assignment - 4

(1) Explain Public key cryptosystems : Authentication, Confidentiality and Authentication and
Confidentiality.
(2) Differentiate between Conventional encryption and Public-key encryption.
(3) Write down steps for the RSA Algorithm.
(4) Perform encryption and decryption using the RSA algorithm for the following:
a. p = 3; q = 11, e = 7; M = 5
b. p = 5; q = 11, e = 3; M = 9
c. p = 7; q = 11, e = 17; M = 8
d. p = 11; q = 13, e = 11; M = 7
e. p = 17; q = 31, e = 7; M = 2
(5) In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose
public key is e = 5, n = 35. What is the plaintext M?
(6) Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71
and a primitive root a = 7.
a. If user A has private key XA = 5, what is A’s public key YA?
b. If user B has private key XB = 12, what is B’s public key YB?
c. What is the shared secret key?
(7) Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root a = 2.
a. Show that 2 is a primitive root of 11.
b. If user A has public key YA = 9, what is A’s private key XA?
c. If user B has public key YB = 3, what is the secret key K shared with A?
(8)Explain Man in the middle attack.
Assignment - 5

1. What is a Hash function?


2. Explain different characteristics of hash function. 3. Explain SHA512
algorithm.
4. Explain the general structure of secure hash functions. 5. Explain MD5 hash
algorithm.

Assignment - 6

1. Write a note on Message Authentication Code.


2. How can the following be achieved with message authentication code(MAC)?
● Message Authentication.
● Message Authentication and Confidentiality.
3. Write properties of hash functions.
4. Explain HMAC in detail.

Assignment - 7

1. Explain digital signature algorithm in detail.


2. Explain different key distribution techniques.
3. What is KDC? List the duties of a KDC.
4. Which techniques are used for the distribution of public keys? 5. Explain X.059
authentication services.
6. List out the various web security threats.
7. Explain Kerberos in detail.
8. Explain SSL protocol in detail.
Assignment – 8

1. What is key management and distribution process?


2. Explain the symmetric key distribution using symmetric and asymmetric encryption?
3. What is an example of a public key infrastructure?

Assignment – 9

1. What is remote user authentication using asymmetric encryption?


2. What are the 3 main parts of Kerberos?

You might also like