Reference no: EM132794762
ITC593 Network Security - Charles Sturt University
1. Briefly describe the concepts of an asymmetric cryptosystem. Use figures and mathematical formulae to illustrate youranswer.
2. Describe substitution and transposition. Using examples, demonstrate how substitution and transposition are used to encrypt and decryptdata.
3. List and briefly define types of cryptanalytic attacks based on what is known to theattacker.
4. Is it possible to develop DES, AES, and RSA cryptography in a single product? Justify your answer.
5. Why do some block cipher modes of operation only useencryption?
6. Using the Vigenere cipher, encrypt the word "Secure Communications" using thekey
7. In cryptography, a substitution box (S-box) is a basic component of DES algorithms. Suppose you are given the 6×4-bit S-box from DES (S5). If you are given a particular binary input e.g. "010010", how do you extract theoutput.
8. In DES algorithm, explain how carefully chosen S-boxes could help resistcryptanalysis.
9. Identify the problems faced by the DES algorithm. What are the motivations for 3DES?
10. Describe how the 3DES system works (including the use of one, two, and threekeys)
11. Explain why 3DES is stronger than regularDES.
12. Explain the avalanche effect of DES. Using a suitable example, show how the avalanche effect impacted in DES, where two keys differ in only one-bitposition.
13. What are the roles of the public key and private key in an asymmetric cryptosystem? Describe the applications of public-keycryptosystems.
14. What are the principal elements of a public-key cryptosystem?
15. Describe with an example of RSA key generationprocess.
16. What do you mean by message authentication and explain withexamples?
17. What are the properties a digital signatureshould?
18. Describe the different classes of digital certificates and theiruses.
19. Define IPsec? Explain with examples the applications of IPSec.
20. What are the advantages of IPSec over TLS in computer networks?Explain.
21. In network traffic security, explain with an example of how IPSec can ensureit.
22. Distinguish between transport and tunnel modes in IPsec. What are the strengths and weakness ofeach?
23. Describe the operation of the SMTP protocol. In your answer, identify the security problems that exist intheprotocol.
24. Why does PGP generate a signature before applyingcompression?
25. What is the difference between an SSL connection and an SSLsession?
26. Define malware and the role of encryption in the operation ofmalware?
27. Define a firewall. Compare and contrast packet filters and application-levelgateways.
28. Discuss why Kerberos is needed when there are already many authentication mechanisms exist.
29. Describe tickets and ticket-granting tickets inKerberos.
30. What are the differences between Kerberos v4 and Kerberosv
31. Describe Kerberos v5services.
32. Describe the operation of Internet Key Exchange(IKE).
33. List and describe three desirable features of emailsecurity.
34. Compare and contrast Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy(PGP).
35.Describe the basic concepts of the secure socket layer (SSL) including how it provides confidentialityand authentication.
36. In public-key cryptography, RSA is one of the popular cryptographic algorithms. Explain with an example-
a. What is the procedure for encryption anddecryption?
b. What is the security flaw ofRSA?
c. How RSA can provide confidentiality and authentication?