OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Security solutions in vlsi design
1. KINGS COLLEGE OF ENGINEERING
M.E. VLSI DESIGN
VL7002 – Security Solutions in VLSI – Prepared By P.Raja Pirian(9994009225)
IMPORTANT QUESTIONS
PART - A
1. Specify the four categories of security threads?
2. Define data security.
3. What are the requirements of a hash function?
4. What is the main advantage of AES over DES?
5. List any two design goals for a firewall.
6. List the benefits of IP Security.
7. Define information flow.
8. Define integrity and non repudiation.
9. Name the processing steps involved in MD5 logic?
10. How secure is DES?
11. What are the purpose of dual signature?
12. Define Electronic Code Book.
13. Specify the four categories of security threads.
14. Define threat and attack.
15. Give the various types of Biometrics.
16. What are the properties of Digital Signature?
17. What is meant by Firewall?
18. Which attack is related to integrity?
19. Which attack is related to confidentiality?
20. What are the requirements of a hash function?
21. Define Stream Cipher.
22. What is the purpose of the S-boxes in DES?
23. What is the use of trusted system?
24. Specify the four categories of security threads?
25. Give few file system securities.
26. List out the two ways in which password can be protected.
27. List out different active attacks.
28. Differentiate symmetric and asymmetric encryption?
29. Compare Substitution and Transposition techniques.
2. 30. How is the S-box constructed?
31. What is the main advantage of AES over DES?
32. Define Hash function.
33. Define Glitch analysis.
34. What is the use of Physical Unclonable Function?
35. Define digital signature.
36. Will the AES replace DES?
37. Define Bit stream level theft.
38. What do you meant by side channel attack?
39. Give the different key sizes of AES algorithm?
40. Give the features of IDEA AES algorithm
PART – B ( 3 X 20 = 80)
UNIT - 1
1. Explain detail about the security mechanisms in OS. (16)
2. Discuss various data communication procedure. (16)
3. Explain various physical security threats and controls. (16)
4. Explain the meaning of computer security. (16)
5. Explain various security threats in networks. (16)
6. Write short Notes on Data security and Computer System Security. (16)
7. Explain various security mechanism in Operating System.
8. Explain the meaning and concept of computer security.
UNIT - II
9. Explain detail about various Biometric Systems. (16)
10. Discuss the various aspects in system security. (16)
11. Explain in detail about Vulnerabilities, Threats, Attacks, and Controls (16)
12. Discuss about various computer system security levels and polices. (16)
13. Explain the algorithm for Triple DES algorithm. (16)
14. Explain about MD5 Message Digest Algorithm. (16)
15. Give any 4 conventional techniques used for cryptography. (13)
16. Explain about RSA algorithm in detail. (13)
3. UNIT - III
1. Analyze the methodology of a three key encryption and decryption technique. (16)
2. Analyze strength of RSA algorithm in detail with an example. (16)
3. Convert “MEET ME” using Hill cipher with the key matrix Convert the cipher text back to
plaintext. (16)
4. Analyze the confidential level of Data Encryption Standard (DES) in detail. (16)
5. Analyze the attacks on Packet Filtering Firewall. (16)
6. With a net diagram explain about Virtual Private Network. (16)
7. Explain the concept of trusted systems. (16)
8. Give the different cyber laws used for e- commerce. (16)
UNIT –IV
1. List the recent attacks on networks and explain any four attacks. (16)
2. Explain about the FPGA hardware security primitives. (16)
3. Explain the concept of FPGA Synthesis Flow and Its Vulnerabilities. (16)
4. Write a brief note on FPGA-based Applied Cryptography. (16)
5. Analyze the technical details of firewall and describe any three types of
firewall (16)
6. Analyze the performance MD5 with SHA-1 algorithm and give its
advantages. (16)
7. Analyze with example how the RSA algorithm is suitable for Digital Signature. (16)
8. Analyze the Encryption algorithms with suitable example. (16)
UNIT – V
1. Write short notes on DES algorithm and also give the implementation methods in
VLSI. (16)
2. Explain about IDEA AES algorithm. (16)
3. Explain about VLSI Implementation of AES algorithm. (16)
4. Explain the development of digital signature chip using RSA algorithm. (16)
5. Analyze with a suitable example how to implement DES algorithm in FPGA. (16)
6. Explain about Digital signature and also give an implementation method using FPGA.
----------