SlideShare a Scribd company logo
1 of 3
KINGS COLLEGE OF ENGINEERING
M.E. VLSI DESIGN
VL7002 – Security Solutions in VLSI – Prepared By P.Raja Pirian(9994009225)
IMPORTANT QUESTIONS
PART - A
1. Specify the four categories of security threads?
2. Define data security.
3. What are the requirements of a hash function?
4. What is the main advantage of AES over DES?
5. List any two design goals for a firewall.
6. List the benefits of IP Security.
7. Define information flow.
8. Define integrity and non repudiation.
9. Name the processing steps involved in MD5 logic?
10. How secure is DES?
11. What are the purpose of dual signature?
12. Define Electronic Code Book.
13. Specify the four categories of security threads.
14. Define threat and attack.
15. Give the various types of Biometrics.
16. What are the properties of Digital Signature?
17. What is meant by Firewall?
18. Which attack is related to integrity?
19. Which attack is related to confidentiality?
20. What are the requirements of a hash function?
21. Define Stream Cipher.
22. What is the purpose of the S-boxes in DES?
23. What is the use of trusted system?
24. Specify the four categories of security threads?
25. Give few file system securities.
26. List out the two ways in which password can be protected.
27. List out different active attacks.
28. Differentiate symmetric and asymmetric encryption?
29. Compare Substitution and Transposition techniques.
30. How is the S-box constructed?
31. What is the main advantage of AES over DES?
32. Define Hash function.
33. Define Glitch analysis.
34. What is the use of Physical Unclonable Function?
35. Define digital signature.
36. Will the AES replace DES?
37. Define Bit stream level theft.
38. What do you meant by side channel attack?
39. Give the different key sizes of AES algorithm?
40. Give the features of IDEA AES algorithm
PART – B ( 3 X 20 = 80)
UNIT - 1
1. Explain detail about the security mechanisms in OS. (16)
2. Discuss various data communication procedure. (16)
3. Explain various physical security threats and controls. (16)
4. Explain the meaning of computer security. (16)
5. Explain various security threats in networks. (16)
6. Write short Notes on Data security and Computer System Security. (16)
7. Explain various security mechanism in Operating System.
8. Explain the meaning and concept of computer security.
UNIT - II
9. Explain detail about various Biometric Systems. (16)
10. Discuss the various aspects in system security. (16)
11. Explain in detail about Vulnerabilities, Threats, Attacks, and Controls (16)
12. Discuss about various computer system security levels and polices. (16)
13. Explain the algorithm for Triple DES algorithm. (16)
14. Explain about MD5 Message Digest Algorithm. (16)
15. Give any 4 conventional techniques used for cryptography. (13)
16. Explain about RSA algorithm in detail. (13)
UNIT - III
1. Analyze the methodology of a three key encryption and decryption technique. (16)
2. Analyze strength of RSA algorithm in detail with an example. (16)
3. Convert “MEET ME” using Hill cipher with the key matrix Convert the cipher text back to
plaintext. (16)
4. Analyze the confidential level of Data Encryption Standard (DES) in detail. (16)
5. Analyze the attacks on Packet Filtering Firewall. (16)
6. With a net diagram explain about Virtual Private Network. (16)
7. Explain the concept of trusted systems. (16)
8. Give the different cyber laws used for e- commerce. (16)
UNIT –IV
1. List the recent attacks on networks and explain any four attacks. (16)
2. Explain about the FPGA hardware security primitives. (16)
3. Explain the concept of FPGA Synthesis Flow and Its Vulnerabilities. (16)
4. Write a brief note on FPGA-based Applied Cryptography. (16)
5. Analyze the technical details of firewall and describe any three types of
firewall (16)
6. Analyze the performance MD5 with SHA-1 algorithm and give its
advantages. (16)
7. Analyze with example how the RSA algorithm is suitable for Digital Signature. (16)
8. Analyze the Encryption algorithms with suitable example. (16)
UNIT – V
1. Write short notes on DES algorithm and also give the implementation methods in
VLSI. (16)
2. Explain about IDEA AES algorithm. (16)
3. Explain about VLSI Implementation of AES algorithm. (16)
4. Explain the development of digital signature chip using RSA algorithm. (16)
5. Analyze with a suitable example how to implement DES algorithm in FPGA. (16)
6. Explain about Digital signature and also give an implementation method using FPGA.
----------

More Related Content

What's hot

Cryptography
CryptographyCryptography
CryptographyAmbuj Rai
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Techglyphs
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunnelingKevin Ndemo
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESRMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESijcisjournal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epulAgate Studio
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 IJCNCJournal
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 

What's hot (16)

Cryptography
CryptographyCryptography
Cryptography
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunneling
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESRMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 

Viewers also liked

Raisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceRaisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceDavid Breton
 
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
Sistemas de control para ingenieria.  3ra edición  Norman S. NiseSistemas de control para ingenieria.  3ra edición  Norman S. Nise
Sistemas de control para ingenieria. 3ra edición Norman S. Nisediego062
 
Anna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da criseAnna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da criseLandoaldo Lima
 
Automobile safety seminar report
Automobile safety seminar reportAutomobile safety seminar report
Automobile safety seminar reportDeepak kango
 

Viewers also liked (10)

smoking-final (2)
smoking-final (2)smoking-final (2)
smoking-final (2)
 
Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner
 
Franquia de Marketing Digital
Franquia de Marketing DigitalFranquia de Marketing Digital
Franquia de Marketing Digital
 
Kieran mccloskey
Kieran mccloskeyKieran mccloskey
Kieran mccloskey
 
Raisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceRaisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_Reference
 
Fractal
FractalFractal
Fractal
 
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
Sistemas de control para ingenieria.  3ra edición  Norman S. NiseSistemas de control para ingenieria.  3ra edición  Norman S. Nise
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
 
B c f section 6
B c f section 6B c f section 6
B c f section 6
 
Anna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da criseAnna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da crise
 
Automobile safety seminar report
Automobile safety seminar reportAutomobile safety seminar report
Automobile safety seminar report
 

Similar to Security solutions in vlsi design

Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questionsvaidheeswari
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017YogeshDhamke2
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
3 ec2352 – computer networks
3  ec2352 – computer networks3  ec2352 – computer networks
3 ec2352 – computer networksvmspraneeth
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)smumbahelp
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network securityVinod Kumar Gorrepati
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...Selva Kumar
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
Networkin new
Networkin newNetworkin new
Networkin newrajujast
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryptionSachin Tripathi
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 

Similar to Security solutions in vlsi design (20)

Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
R09 information security – ii
R09 information security – iiR09 information security – ii
R09 information security – ii
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
3 ec2352 – computer networks
3  ec2352 – computer networks3  ec2352 – computer networks
3 ec2352 – computer networks
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network security
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Ip security
Ip security Ip security
Ip security
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Networkin new
Networkin newNetworkin new
Networkin new
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Moein
MoeinMoein
Moein
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

More from Raja pirian

Micro Processor And Micro controller
Micro Processor And Micro controller Micro Processor And Micro controller
Micro Processor And Micro controller Raja pirian
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
Micro proccesor practical course plan
Micro proccesor practical course planMicro proccesor practical course plan
Micro proccesor practical course planRaja pirian
 
Smart india hackathon 2018
Smart india hackathon 2018Smart india hackathon 2018
Smart india hackathon 2018Raja pirian
 

More from Raja pirian (6)

Bt action words
Bt action wordsBt action words
Bt action words
 
Micro Processor And Micro controller
Micro Processor And Micro controller Micro Processor And Micro controller
Micro Processor And Micro controller
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Micro proccesor practical course plan
Micro proccesor practical course planMicro proccesor practical course plan
Micro proccesor practical course plan
 
Smart india hackathon 2018
Smart india hackathon 2018Smart india hackathon 2018
Smart india hackathon 2018
 
Adhoc qb14 (1)
Adhoc qb14 (1)Adhoc qb14 (1)
Adhoc qb14 (1)
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Security solutions in vlsi design

  • 1. KINGS COLLEGE OF ENGINEERING M.E. VLSI DESIGN VL7002 – Security Solutions in VLSI – Prepared By P.Raja Pirian(9994009225) IMPORTANT QUESTIONS PART - A 1. Specify the four categories of security threads? 2. Define data security. 3. What are the requirements of a hash function? 4. What is the main advantage of AES over DES? 5. List any two design goals for a firewall. 6. List the benefits of IP Security. 7. Define information flow. 8. Define integrity and non repudiation. 9. Name the processing steps involved in MD5 logic? 10. How secure is DES? 11. What are the purpose of dual signature? 12. Define Electronic Code Book. 13. Specify the four categories of security threads. 14. Define threat and attack. 15. Give the various types of Biometrics. 16. What are the properties of Digital Signature? 17. What is meant by Firewall? 18. Which attack is related to integrity? 19. Which attack is related to confidentiality? 20. What are the requirements of a hash function? 21. Define Stream Cipher. 22. What is the purpose of the S-boxes in DES? 23. What is the use of trusted system? 24. Specify the four categories of security threads? 25. Give few file system securities. 26. List out the two ways in which password can be protected. 27. List out different active attacks. 28. Differentiate symmetric and asymmetric encryption? 29. Compare Substitution and Transposition techniques.
  • 2. 30. How is the S-box constructed? 31. What is the main advantage of AES over DES? 32. Define Hash function. 33. Define Glitch analysis. 34. What is the use of Physical Unclonable Function? 35. Define digital signature. 36. Will the AES replace DES? 37. Define Bit stream level theft. 38. What do you meant by side channel attack? 39. Give the different key sizes of AES algorithm? 40. Give the features of IDEA AES algorithm PART – B ( 3 X 20 = 80) UNIT - 1 1. Explain detail about the security mechanisms in OS. (16) 2. Discuss various data communication procedure. (16) 3. Explain various physical security threats and controls. (16) 4. Explain the meaning of computer security. (16) 5. Explain various security threats in networks. (16) 6. Write short Notes on Data security and Computer System Security. (16) 7. Explain various security mechanism in Operating System. 8. Explain the meaning and concept of computer security. UNIT - II 9. Explain detail about various Biometric Systems. (16) 10. Discuss the various aspects in system security. (16) 11. Explain in detail about Vulnerabilities, Threats, Attacks, and Controls (16) 12. Discuss about various computer system security levels and polices. (16) 13. Explain the algorithm for Triple DES algorithm. (16) 14. Explain about MD5 Message Digest Algorithm. (16) 15. Give any 4 conventional techniques used for cryptography. (13) 16. Explain about RSA algorithm in detail. (13)
  • 3. UNIT - III 1. Analyze the methodology of a three key encryption and decryption technique. (16) 2. Analyze strength of RSA algorithm in detail with an example. (16) 3. Convert “MEET ME” using Hill cipher with the key matrix Convert the cipher text back to plaintext. (16) 4. Analyze the confidential level of Data Encryption Standard (DES) in detail. (16) 5. Analyze the attacks on Packet Filtering Firewall. (16) 6. With a net diagram explain about Virtual Private Network. (16) 7. Explain the concept of trusted systems. (16) 8. Give the different cyber laws used for e- commerce. (16) UNIT –IV 1. List the recent attacks on networks and explain any four attacks. (16) 2. Explain about the FPGA hardware security primitives. (16) 3. Explain the concept of FPGA Synthesis Flow and Its Vulnerabilities. (16) 4. Write a brief note on FPGA-based Applied Cryptography. (16) 5. Analyze the technical details of firewall and describe any three types of firewall (16) 6. Analyze the performance MD5 with SHA-1 algorithm and give its advantages. (16) 7. Analyze with example how the RSA algorithm is suitable for Digital Signature. (16) 8. Analyze the Encryption algorithms with suitable example. (16) UNIT – V 1. Write short notes on DES algorithm and also give the implementation methods in VLSI. (16) 2. Explain about IDEA AES algorithm. (16) 3. Explain about VLSI Implementation of AES algorithm. (16) 4. Explain the development of digital signature chip using RSA algorithm. (16) 5. Analyze with a suitable example how to implement DES algorithm in FPGA. (16) 6. Explain about Digital signature and also give an implementation method using FPGA. ----------