Computer and Network Security
Question Define cryptography. How can cryptography works as security tool?
NU Year 2017
Question What do you mean by symmetric and asymmetric encryption techniques? Differentiate between them.
NU Year 2017
Question How can a plaintext can convert into cipher text? Give example.
NU Year 2017
Question List and briefly define categories of attack methodologies.
NU Year 2017
Question Define transposition cipher.
NU Year 2017
Question Explain Data Encryption Standard (DES) in detail.
NU Year 2017
Question State and explain the principles of public key cryptography.
NU Year 2017
Question Perform encryption and decryption operation using RSA algorithm for a specific case.
NU Year 2017
Question Differentiate public key and conventional encryption.
NU Year 2017
Question What is message authentication? Define the classes of message authentication function.
NU Year 2017
Question What do you mean by digital signature? What are properties a digital signature should have?
NU Year 2017
Question Briefly explain name Hellman Key exchange.
NU Year 2017
Question What are the differences weak and strong collision resistance?
NU Year 2017
Question What is feistel cipher? l low it works in a cryptographic algorithm?
NU Year 2017
Question Define kerberos. Briefly explain kerberos V4.
NU Year 2017
Question Differentiate between AES and DES algorithm.
NU Year 2017
Question What do you mean by confusion and diffusion?
NU Year 2017
Question What is firewall and what are its limitations? Why corporate house implement more than one firewall for security?
NU Year 2017
Question Describe MD-S algorithm in detail. Compare its performance with SHA-1.
NU Year 2017
Question What is the purpose of X. 509 standard?
NU Year 2017
Question Give the applications of lP security.
NU Year 2017
Question Write the short notes on any four :-(i) S/MIME;(ii) Email Security;(iii) ESP;(iv) steganography;(v) Elliptic curve cryptography;(vi) Digital Immune System.
NU Year 2017
Question Define cryptography
NU Year 2017
Question How can cryptography work as a security tool.What do you mean by symmetric and asymmetric encryption techniqueDifferentiate between symmetric and asymmetric encryption technique
Question How can cryptography work as a security tool?
NU Year 2017
Question What do you mean by symmetric and asymmetric encryption technique?
NU Year 2017
Question Difference between symmetric and asymmetric encryption method
NU Year 2017
Question How can a plaintext can be converted into cipher text? Give example.
NU Year 2017
Question How List and briefly describe categories of attack methodologies.
Question List and briefly define categories of attack methodologies.
NU Year 2017
Question Define transposition cipher.
NU Year 2017
Question Explain Data Encryption Standard (DES) in detail.
NU Year 2017
Question State and explain the principles of public key cryptography.
NU Year 2017
Question Perform encryption and decryption operation using RSA algorithm for a specific case.
NU Year 2017
Question Differentiate public key and conventional key encryption.
NU Year 2017
Question What is message authentication? Define the classes of message authentication function?
NU Year 2017
Question What do you mean by digital signature? What are the properties a digital signature should have?
NU Year 2017
Question Briefly explain Diffie Hellman Key exchange method?
NU Year 2017
Question What are the difference between weak and strong collision resistance?
NU Year 2017
Question What is feistel cipher? How it works in a cryptographic algorithm ?
NU Year 2017
Question Define kerberos. Briefly explain kerberos V4.
NU Year 2017
Question Differentiate between AES and DES algorithm.
NU Year 2017
Question What do you mean by confusion and diffusion?
NU Year 2017
Question What is firewall and what are its limitations? Why corporate house implement more than one firewall for security?
NU Year 2017
Question Describe MD-5 algorithm in detail. Compare its performance with SHA-1.
NU Year 2017
Question What is the purpose of X.509 standard?
NU Year 2017 2015
Question Give the applications of IP security.
NU Year 2017
Question Write short notes on any four :- a) S/MIME b) Email Security c) ESP d) Steganography e) Elliptic curve cryptography f) Digital Immune System
NU Year 2017
Question What is cryptography? Briefly explain OSI Security Architectures.
NU Year 2016
Question Distinguish network threats and attacks.
NU Year 2016
Question Write down three independent dimensions of cryptography.
NU Year 2016
Question Draw network security model and discuss about it.
NU Year 2016
Question Give example of Brute-force attack.
NU Year 2016
Question Explain the rules for encrypting plaintext using play fair cipher with suitable example.
NU Year 2016
Question What is message authentication? Define the classes of message authentication function.
NU Year 2016
Question Compare the security system on public key cryptography and private key cryptography.
NU Year 2016
Question What is the difference between monoalphabetic cipher and poly alphabetic cipher?
NU Year 2016
Question What is hash function? Explain the SHA-512 logic algorithm.
NU Year 2016
Question Write down the digital signature algorithm.
NU Year 2016
Question Explain the IPSec architecture.
NU Year 2016
Question Briefly discuss how attacks on password are broadly classified? .
NU Year 2016
Question What are the key features of SET and SET participants?
NU Year 2016
Question State and explain man-in-the middle attack.
NU Year 2016
Question Define a worm? Diagrammatically illustrate a digital immune system.
NU Year 2016
Question What is fire wall? What are the advantages of fire wall.
NU Year 2016
Question What is socket? Describe the algorithm of SSL (Security Socket Layer)
NU Year 2016
Question Write short notes on (any four) :- a) Feistal Cipher b) RC4 Algorithm c) PRNG d) Elliptic Curve Cryptography e) Whirlpool f) X.509 Authentication Format g) Public key Infrastructure
NU Year 2016
Question What do you mean by network security? What are the traditional methods for network security?
NU Year 2015
Question Explain the symmetric cipher model with its ingredients.
NU Year 2015
Question Define encryption. State the application of the public key crypto system.
NU Year 2015
Question Differentiate between active attacks and passive attacks.
NU Year 2015
Question Describe a general model for network security briefly.
NU Year 2015
Question Perform encryption and decryption using RSA algorithm for the following :- p=7; q=11; e=17; M=8.
NU Year 2015 2015
Question Why block cypher model are convenient?
NU Year 2015
Question Differentiate between weak collision resistance and strong collision resistance.
NU Year 2015
Question What is MIME? List the limitations of SMTP/REC 822
NU Year 2015
Question Why E-mail compatibility function in PGP needed?
NU Year 2015
Question Describe public key algorithm with required diagram.
NU Year 2015
Question What is feistel cypher? How it works in a cryptographic algorithm?
NU Year 2015
Question Differentiate between AES and DES.
NU Year 2015
Question Briefly explain Diffie Hellman key exchange.
NU Year 2015
Question What is digital signature? Describe digital signature with block diagram.
NU Year 2015
Question What is Kerberos? What four requirements were defines for Kerberos?
NU Year 2015
Question What is message authentication code? What are some approaches to producing message authentication?
NU Year 2015
Question What are the original set of criteria used by NIST to evaluate candidate AES cypher?
NU Year 2015
Question Write short notes (any four):- a) Email Security; b) PGP; c) ESP; d) SET; e) S/MIME; f) Secure Socket Layer; g) Unix Password Scheme.
NU Year 2015
Question Describe the model of network security.
NU Year 2014
Question Define security attack. Discuss in a nutshell the different types of security attack with suitable figure.
NU Year 2014
Question What is brute force attack? Explain various types of cryptanalysis attack with necessary diagram.
NU Year 2014
Question What are the differences between an unconditionally secure cipher and a computationally secure cipher?.
NU Year 2014
Question Define steganography. Which parameters and design choice determine the actual algorithm of a Feistel Cipher ?
NU Year 2014
Question List four general characteristics of schema for the distribution of the public key. Explain the RSA algorithm and its security mechanisms.
NU Year 2014
Question Distinguish between a block cipher and a stream cipher. What is the strength of Data Encryption Standard(DES)?
NU Year 2014
Question What is the difference between the AES decryption algorithm and the equivalent inverse cipher? What was the final set of criteria used by NIST to evaluate candidate AES cipher?
NU Year 2014
Question What is triple encryption? How many keys are used in this encryption technique? Why is the middle portion of 3DES decryption rather than an encryption ?
NU Year 2014
Question Briefly explain general DES encryption algorithm.
NU Year 2014
Question Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
NU Year 2014
Question Distinguish between a session key and a master key.
NU Year 2014
Question Briefly explain four categories of of schemas for the distribution of public keys.
NU Year 2014
Question User A and B exchanges the key using Diffie-Hellman algorithm. Assume a=5, q=11, XA=2, XB=3. Find YA, YB, K.
NU Year 2014
Question Differentiate the following terms : a) Link and end to end encryption; b) Public key certificate and elliptic curve.
NU Year 2014
Question What is 'Digital Signature'? Explain Diffie-Hellman key exchange algorithm.
NU Year 2014
Question Draw an analogy between MD5 and SHA algoritm.
NU Year 2014
Question What are the typical contents of X.509 certificate format? State the purpose of different fields of Certificate Revocation List(CRL). What is delta revocation?
NU Year 2014
Question Write short notes (any four) :- a) Product Cipher; b) UNIX password schemes; c) Secure Socket Layer; d) Hash function; e) IPSec ESP format; f) S/MIME.
NU Year 2014
Question Define cryptography. Explain the difference between symmetric and asymmetric encryption listing an advantage and disadvantage of each.
NU Year 2014
Question What functions should be provided by the public key infrastructure (PKI)? Is it possible to operate such an encryption technique without a PKI?
NU Year 2014
Question Briefly explain different types of security services.
NU Year 2014
Question Make a comparison between stream ciphers and block ciphers with example.
NU Year 2014
Question Explain public key cryptography for encryption and authentication.
NU Year 2014
Question Draw single round DES architecture and briefly explain its operational procedure.
NU Year 2013
Question Write down the difference between block cipher and stream cipher.
NU Year 2013
Question Briefly discuss key distribution process by KDC.
NU Year 2013
Question Describe the key components of wireless network and their purpose.
NU Year 2013
Question Define MAC. How message authentication is performed?
NU Year 2013
Question Mention the applications and benefits of IPSec.
NU Year 2013
Question Define elliptic curve. With example discuss ECC over prime field.
NU Year 2013
Question How can RSA be used for creating a digital signature?
NU Year 2013
Question Describe the three possible attacks on RSA and explain how RSA responds to each of these attacks.
NU Year 2013
Question A Feistel cipher is used in the DES algorithm. Describe the Feistel cipher.
NU Year 2013
Question What are the advantages of Distributed Processing?
Institute Institute of Science and Technology, Bangladesh 2015
Question What is protocol? What are the key elements of protocols?
Institute Tejgaon College 2017
Question List the layers of OSI?
Institute Abudharr Gifari College 2017
Question List the layers of OSI Vs TCP/IP?
Institute Joypurhat Govt. College 2017