Information Security Test Questions Bank 2024 (PDF)

Document Details

Uploaded by Deleted User

S.P.B. Patel Engineering College Saffrony Institute of Technology

2024

Prof.Upashana Goswami

Tags

information security cryptography encryption computer science

Summary

This is a question bank for a 7th-semester computer engineering course at S.P.B.Patel Engineering College. It includes questions on topics such as cryptography, encryption, and information security, likely for the information security course. The questions cover various algorithms like CIA triangle, symmetric, asymmetric encryption, DES and AES. The document was prepared in Winter 2024 by Prof. Upashana Goswami.

Full Transcript

**S.P.B.Patel Engineering College Saffrony Institute of Technology, Winter 2024** **Prepared By:** Prof.Upashana Goswami -- -- -- -- -- -- -- -- +-----------------+-----------------+-----------------+-----------------+ | | |...

**S.P.B.Patel Engineering College Saffrony Institute of Technology, Winter 2024** **Prepared By:** Prof.Upashana Goswami -- -- -- -- -- -- -- -- +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | **1** | 1 | a. Explain CIA | **7** | | | | triangle. | | | | | | | | | | b. Compare | | | | | symmetric | | | | | key and | | | | | asymmetric | | | | | key | | | | | encryption. | | +-----------------+-----------------+-----------------+-----------------+ | **2** | 2 | | **7** | +-----------------+-----------------+-----------------+-----------------+ | **3** | 1 | | 7 | +-----------------+-----------------+-----------------+-----------------+ | **4** | 2 | \(a) Explain | **7** | | | | key expansion | | | | | of AES. | | | | | | | | | | \(b) Explain S | | | | | box | | | | | functionality | | | | | in DES. | | +-----------------+-----------------+-----------------+-----------------+ +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | **5** | 2 | | **7** | +-----------------+-----------------+-----------------+-----------------+ | **6** | 2 | Explain double | **7** | | | | DES in brief | | | | | with the help | | | | | of a suitable | | | | | diagram. How | | | | | meet in the | | | | | middle attack | | | | | is performed on | | | | | double DES? | | +-----------------+-----------------+-----------------+-----------------+ | **7** | 4 | a. Explain RSA | **7** | | | | algorithm | | | | | (key pair | | | | | generation. | | | | | Encryption | | | | | and | | | | | Decryption) | | +-----------------+-----------------+-----------------+-----------------+ | **8** | 3 | Diagram. | **7** | | | | (Mention | | | | | advantages and | | | | | limitations | | | | | also) | | +-----------------+-----------------+-----------------+-----------------+ -------- --- ---------------------------------------------------------------------------------------------------------------------------- ------- **9** 3 Explain double DES in brief with the help of a suitable diagram. How meet in the middle attack is performed on double DES? **7** **10** 4 Explain Diffie Hellman key exchange algorithm. Explain man in middle attack in Diffie Hellman key exchange. **7** **11** 5 **7** **12** 3 Explain triple DES with two keys and three keys. **7** -------- --- ---------------------------------------------------------------------------------------------------------------------------- ------- +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | **13** | 6 | a. What is | **7** | | | | MAC? | | | | | Differentia | | | | | te | | | | | between MAC | | | | | and | | | | | cryptograph | | | | | ic | | | | | hash. What | | | | | are | | | | | practical | | | | | application | | | | | s | | | | | or use of | | | | | MAC? | | +-----------------+-----------------+-----------------+-----------------+ | **14** | 5 | a. Explain | **7** | | | | HMAC with a | | | | | block | | | | | diagram. | | | | | | | | | | b. Differentia | | | | | te | | | | | between | | | | | hashing and | | | | | encryption. | | +-----------------+-----------------+-----------------+-----------------+ | **15** | 8 | Write a short | **7** | | | | note on public | | | | | key | | | | | infrastructure. | | +-----------------+-----------------+-----------------+-----------------+ | **16** | 9 | access? | **7** | +-----------------+-----------------+-----------------+-----------------+

Use Quizgecko on...
Browser
Browser