Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views1 page

Assignment 3 INSQB

The document outlines various concepts and techniques in cryptography, including definitions of key terms such as encryption, decryption, and cryptanalysis. It also discusses specific encryption methods like the Caesar cipher, Playfair cipher, and AES, along with security protocols like PGP and the importance of email security. Additionally, it addresses network security concepts such as demilitarized zones, intrusion detection systems, and threats to mobile phones.

Uploaded by

adityapandji1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

Assignment 3 INSQB

The document outlines various concepts and techniques in cryptography, including definitions of key terms such as encryption, decryption, and cryptanalysis. It also discusses specific encryption methods like the Caesar cipher, Playfair cipher, and AES, along with security protocols like PGP and the importance of email security. Additionally, it addresses network security concepts such as demilitarized zones, intrusion detection systems, and threats to mobile phones.

Uploaded by

adityapandji1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2 Marks:

1. Describe the role of public key distribution in cryptography?


2. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption
3. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography 3. Explain the terms with example: 1)
Piggy-backing 2) Shoulder Surfing 3) Dumper diving
4. Explain the working of the Caesar cipher with an example.
5. Describe the Rail Fence technique? Explain with an example.
6. Explain the Simple Columnar transposition technique work?
7. Write any 2 key differences between DES and AES encryption algorithms?
8. State the importance of key length in AES encryption?
9. Explain the significance of MD5 in cryptographic hash functions.
10. Define a hash function and mention two important features.
11. State the importance of Pretty Good Privacy (PGP) protocol in enhancing email security?
12. State the need for a demilitarized zone (DMZ) in network security?
13. Describe Honeypot?
14. State any 4 points of email security techniques.
15. Define: 1) Hacking 2) Digital forgery 3) Cyber Stalking/Harassment 4) Cyber pornography 5) IDS

4 Marks:
1.
Describe the Playfair cipher technique? Encrypt the word "VPMS" using a Playfair cipher with “MONARCHY”
sample key.
2. Describe the Simple Columnar transposition technique and encrypt the word "SECURITY" using key 4.
3. Explain the Diffie-Hellman key exchange algorithm and how a man-in-the-middle attack can affect it.
4. Describe digital signature? Explain its working with diagram.
5. Explain stepwise procedure of AES/DES/RSA
6. Describe threats to mobile phone. Explain in detail process to prevent them.
7. Compare MD5 with SHA.
8. Define Crime against individual, Government, Property.
9. With the help of diagram explain host-based and network-based IDSs.
10. Compare host -based and network based IDSs. (Any 4 points).
11. Describe SMTP in e-mail security.
12. How does an Intrusion Detection System (IDS) work? Compare honeypots with IDS.
13. Define OS fingerprinting? How do attackers use it in cyberattacks?
14. if p = 13, q = 5 are the given prime numbers and public key is e = 7, find the value of private key d and plain
text of cipher value 6.
15. Describe the working principle of firewall.

You might also like