# 2170709 INS IMP Questions

1 What is Trusted System? Explain the Principles of Security.

2 Describe Active and Passive Attacks in Detail.

3 Explain Specific types of Attacks.

4 Define the Terms:

1) Cryptography

2) Cryptanalysis

3) Cryptology

4) Plain Text

5) Cipher Text

6) Encryption

7) Decryption

8) Brute Force Attack

5 Explain Playfair and Hill Cipher Substitution Techniques with Example.

6 Explain Symmetric and Asymmetric Key Cryptography. Also give the difference between

Symmetric and Asymmetric Key Cryptography.

7 Explain Diffie-Hellman Key exchange/Agreement Algorithm. Also Explain Man-in- the-

Middle Attack.

8 Describe Key Range and Key Size.

9 Describe Possible Types of Attacks base on known Information.

10 Write Types of Algorithm modes. Why mode operation is defined? Explain the Block

Cipher Mode of Operations.

11 Explain DES Algorithm in Brief. Also Explain Variation of DES.

12 Explain AES Algorithm in Brief.

13 Explain RSA Algorithm in Brief with Example.

14 Explain MD5 Algorithm in detail.

15 Explain SHA-1 Algorithm in detail.

16 Explain SHA-512 Algorithm in detail.

17 What is MAC? Explain HMAC Algorithm.

18 What is Digital Signature? Explain its use with the help of example.

19 Explain Key Distribution Scenario in detail.

20 What is DSS? Explain DSA Algorithm in Detail.

21 What is Kerberos? How Session key is Distributed in Kerberos?

22 What is Digital Certificate? Write example of Digital Certificate with its Fields.

23 Define the terms Threat and Attack. List and briefly define Categories of Security Attacks.