Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Geetanjali Institute of Technical Studies, Udaipur

Department of CSE

ASSIGNMENT RECORD

Name :-
Roll No:-
Year/Semester/Section:-IIIYear/VISemester/Section A and B
Branch:- Computer Science and Engg.
Session:-Even Semester 2019-2020
Subject Name:-Information Security System
Subject Code:- 6CS4-03
Subject Teacher:-Mr Abhishek Gupta
Assistant Professor,CSE
Geetanjali Institute of Technical Studies, Udaipur
Department of CSE
Even Sem. 2019-2020
6CS4-03– Information Security System
Assignment Front Page
Name of Student RTU Roll No.
Submitted To: Mr. Abhishek Gupta

Evaluation Sheet:
S. Unit Question Max Marks Dateof CO MAPPED SIGN
No. Number Marks Obtained Submission
1 5
1 I CO36403.1
2 5
1 5
2 II CO36403.2
2 5
1 5
2 III CO36403.3
2 5
1 5
4 IV CO36403.4
2 5
1 5
5 V CO36403.5
2 5

Overall
Grade:………………………
Signature:
ASSIGNMENT
UNIT –I
Questions

Set 1

Ques 1: (i) Differentiate between cryptography, cryptology and cryptanalysis.


(ii) Write short note on substitution and transposition techniques
Ques 2: Explain Hill Cipher with example.

Set II
Ques 3: Explain information security goals in detail.
Ques 4: Explain Playfair Substitution Technique with example.
Set III

Ques 5: Discuss cryptography. Explain block and stream cipher in detail.


Ques 6: Explain the key principles of security with suitable example.

UNIT –II

Questions

Set I

Ques 1: Explain the different Block Cipher mode of operation in details.


Ques 2: Explain Data Encryption Standard (DES) in detail.
Set II
Ques 3: Explain the importance of one-time initialization process. Describe each steps of AES algorithm.

Ques 4: Explain triple DES in detail.


Set III
Ques 5: Explain design principle of block cipher.

Ques 6: Write short note on strength of DES.

UNIT –III
Questions
Set I

Ques 1: Explain Elliptic curve cryptosystem in detail.


Ques 2: Explain RSA in detail with security analysis of RSA.

Set II
Ques 3: Explain Rabin Cryptosystem in detail.
Ques 4: Perform Encryption and Decryption using RSA algorithm.
(i) P = 5, Q = 11, E = 3, M = 7
(ii) P = 11, Q = 13, E = 11, M = 7
(iii) P = 3, Q = 11, E = 7, M = 5
Set III
Ques 5: State and explain the principles of public key cryptography
Oues 6: Explain Elgamal cryptosystem in detail.

UNIT –IV
Questions

Set I

Ques 1: Describe the Digital signature. Show how signing and verification is done using DSS
(Digital Signature Standard)
Ques 2: Explain secure Hash function with SHA algorithm.
Set II

Ques 3: Explain MD5 Message digest algorithm with its logic and compression function.
Ques 4: What is Message Authentication code (MAC)? Explain types of MAC in detail.

Set III

Ques 5: What is the difference between Hash and MAC? Discuss the methods of accomplish the
confidentiality and authentication using MAC and Has

Ques 6: Explain NIST digital signature algorithm in detail.

UNIT –V
Questions

Set I
Ques 1: What entities constitute a full-service Kerberos environment.
Ques 2: Explain X.509 authentication service.
Set II
Ques 3: Write short note on:
(i) HTTPS
(ii) SSH

Ques 4: Explain different types of web security threats in detail.


Set III
Ques 5: 1. Describe the following scheme for distribution of public keys:
(i) Public key authority
(i) Public key certificate

Ques 6: Explain SSL Architecture in detail.

You might also like