Important RGPV Question
Table of Contents
ToggleAL-604 (B), Information Security & Management
VI Sem, AIML
UNIT-I: Introduction and Mathematical Foundation
- Define the need for information security in modern organizations. Why is it critical in today’s digital world?
- Explain the difference between a threat, vulnerability, and exploit with suitable examples.
- What is the CIA triad? Describe each component and its significance in information security.
- Discuss the principle of non-repudiation. How does it enhance security in digital transactions?
- Classify security attacks into active and passive attacks. Provide two examples of each.
- What is a prime number? Explain its role in cryptographic algorithms.
- Solve the following using modular arithmetic: Find the value of 15 mod 7 and 20 mod 3.
- State Fermat’s Theorem. How is it applied in cryptographic systems?
- Explain Euler’s Theorem with an example. Why is it important in cryptography?
- Describe the Euclidean Algorithm. Demonstrate its use to find the GCD of 48 and 18.
- What is the Chinese Remainder Theorem? Solve: x ≡ 2 (mod 3), x ≡ 3 (mod 5).
- Explain the concept of discrete logarithms and their significance in public-key cryptography.
- Compare authentication and authorization. How do they contribute to security principles?
- What are the challenges in achieving perfect security? Discuss with reference to security principles.
- Analyze a real-world security attack (e.g., phishing) and classify it based on its type and impact.
UNIT-II: Symmetric Key Cryptography
- What is classical cryptography? Differentiate between substitution and transposition ciphers.
- Explain the substitution cipher with an example. How can it be cryptanalyzed?
- Describe the transposition cipher. Demonstrate its working with a simple example.
- What is the Data Encryption Standard (DES)? Discuss its structure and key size.
- Compare DES and 3DES. Why was 3DES introduced?
- Explain the Advanced Encryption Standard (AES). How does it differ from DES in terms of security?
- What are modes of operation in symmetric cryptography? Describe ECB and CBC modes.
- Discuss the advantages and disadvantages of the Electronic Codebook (ECB) mode.
- Explain how Cipher Block Chaining (CBC) mode enhances security compared to ECB.
- What is linear cryptanalysis? How can it be used to attack symmetric ciphers?
- Describe differential cryptanalysis. Provide an example of its application on DES.
- Why is cryptanalysis important in evaluating symmetric key ciphers? Discuss with examples.
- Compare the security strengths of DES, 3DES, and AES against modern computational power.
- Design a simple substitution cipher and demonstrate its encryption and decryption process.
- Analyze the impact of weak key management on the security of symmetric key cryptography.
UNIT-III: Asymmetric Key Cryptography
- What is asymmetric key cryptography? How does it differ from symmetric key cryptography?
- Explain the importance of key distribution in cryptographic systems. Discuss its challenges.
- Describe the Diffie-Hellman Key Exchange algorithm with a step-by-step example.
- What is the RSA algorithm? Explain its encryption and decryption process.
- Discuss the role of prime numbers in the RSA algorithm. Why are large primes preferred?
- Explain the Elliptic Curve Cryptography (ECC). How does it compare to RSA in terms of efficiency?
- What are the advantages of ECC over traditional asymmetric algorithms like RSA?
- Describe a man-in-the-middle attack on the Diffie-Hellman Key Exchange. How can it be prevented?
- What is a brute-force attack on a cryptosystem? Discuss its feasibility against RSA.
- Explain a chosen-ciphertext attack. How can asymmetric systems defend against it?
- Discuss the role of key management in asymmetric cryptography. Why is it critical?
- Compare the computational complexity of RSA and ECC for equivalent security levels.
- How does the key size impact the security of asymmetric algorithms? Provide examples.
- Analyze the impact of quantum computing on asymmetric key cryptography algorithms.
- Design a simple scenario where Diffie-Hellman is used to establish a shared secret key.
UNIT-IV: Authentication & Integrity
- What is a Message Authentication Code (MAC)? Explain its role in ensuring integrity.
- Describe the properties of a good hash function. Why are they important for security?
- Compare SHA-1 and SHA-256 in terms of security and performance.
- Explain the MD5 algorithm. Why is it considered insecure for modern applications?
- What is HMAC? How does it combine hash functions and secret keys for authentication?
- Discuss the concept of digital signatures. How do they ensure authenticity and integrity?
- Explain the role of authentication protocols in secure communication. Provide an example.
- What is authorization? How does it differ from authentication in access control?
- Describe the components of the X.509 Digital Certificate. Why is it widely used?
- Explain how access control mechanisms protect sensitive data in an organization.
- Discuss the vulnerabilities of weak hash functions like MD5 in real-world applications.
- How does a digital signature prevent repudiation in electronic transactions? Explain.
- Compare the security features of MAC and digital signatures in ensuring message integrity.
- Design a simple authentication protocol using HMAC for secure client-server communication.
- Analyze the role of X.509 certificates in establishing trust in e-commerce platforms.
UNIT-V: E-mail, IP, and Web Security
- What is Pretty Good Privacy (PGP)? Explain its role in securing e-mail communication.
- Compare PGP and S/MIME in terms of functionality and use cases.
- What is MIME? How does it enhance e-mail security when combined with S/MIME?
- Explain the IP Security (IPSec) protocol. Discuss its key components.
- What is the difference between Transport and Tunnel modes in IPSec?
- Describe the Secure Sockets Layer (SSL). How does it secure web communication?
- Explain the Transport Layer Security (TLS) protocol. How does it differ from SSL?
- What is Secure Electronic Transaction (SET)? Discuss its advantages and limitations.
- Define a firewall. Compare packet-filtering and application-level firewalls.
- What is an Intrusion Detection and Prevention System (IDPS)? Explain its types.
- Discuss the role of risk management in developing an information security strategy.
- Explain the components of a security plan for an organization’s IT infrastructure.
- Analyze the vulnerabilities exploited in a real-world web security attack (e.g., SQL injection).
- Design a simple e-mail security setup using PGP for a small organization.
- Discuss the challenges of implementing TLS in legacy web applications and their solutions.
— Best of Luck for Exam —