SlideShare a Scribd company logo
KINGS COLLEGE OF ENGINEERING
M.E. VLSI DESIGN
VL7002 – Security Solutions in VLSI – Prepared By P.Raja Pirian(9994009225)
IMPORTANT QUESTIONS
PART - A
1. Specify the four categories of security threads?
2. Define data security.
3. What are the requirements of a hash function?
4. What is the main advantage of AES over DES?
5. List any two design goals for a firewall.
6. List the benefits of IP Security.
7. Define information flow.
8. Define integrity and non repudiation.
9. Name the processing steps involved in MD5 logic?
10. How secure is DES?
11. What are the purpose of dual signature?
12. Define Electronic Code Book.
13. Specify the four categories of security threads.
14. Define threat and attack.
15. Give the various types of Biometrics.
16. What are the properties of Digital Signature?
17. What is meant by Firewall?
18. Which attack is related to integrity?
19. Which attack is related to confidentiality?
20. What are the requirements of a hash function?
21. Define Stream Cipher.
22. What is the purpose of the S-boxes in DES?
23. What is the use of trusted system?
24. Specify the four categories of security threads?
25. Give few file system securities.
26. List out the two ways in which password can be protected.
27. List out different active attacks.
28. Differentiate symmetric and asymmetric encryption?
29. Compare Substitution and Transposition techniques.
30. How is the S-box constructed?
31. What is the main advantage of AES over DES?
32. Define Hash function.
33. Define Glitch analysis.
34. What is the use of Physical Unclonable Function?
35. Define digital signature.
36. Will the AES replace DES?
37. Define Bit stream level theft.
38. What do you meant by side channel attack?
39. Give the different key sizes of AES algorithm?
40. Give the features of IDEA AES algorithm
PART – B ( 3 X 20 = 80)
UNIT - 1
1. Explain detail about the security mechanisms in OS. (16)
2. Discuss various data communication procedure. (16)
3. Explain various physical security threats and controls. (16)
4. Explain the meaning of computer security. (16)
5. Explain various security threats in networks. (16)
6. Write short Notes on Data security and Computer System Security. (16)
7. Explain various security mechanism in Operating System.
8. Explain the meaning and concept of computer security.
UNIT - II
9. Explain detail about various Biometric Systems. (16)
10. Discuss the various aspects in system security. (16)
11. Explain in detail about Vulnerabilities, Threats, Attacks, and Controls (16)
12. Discuss about various computer system security levels and polices. (16)
13. Explain the algorithm for Triple DES algorithm. (16)
14. Explain about MD5 Message Digest Algorithm. (16)
15. Give any 4 conventional techniques used for cryptography. (13)
16. Explain about RSA algorithm in detail. (13)
UNIT - III
1. Analyze the methodology of a three key encryption and decryption technique. (16)
2. Analyze strength of RSA algorithm in detail with an example. (16)
3. Convert “MEET ME” using Hill cipher with the key matrix Convert the cipher text back to
plaintext. (16)
4. Analyze the confidential level of Data Encryption Standard (DES) in detail. (16)
5. Analyze the attacks on Packet Filtering Firewall. (16)
6. With a net diagram explain about Virtual Private Network. (16)
7. Explain the concept of trusted systems. (16)
8. Give the different cyber laws used for e- commerce. (16)
UNIT –IV
1. List the recent attacks on networks and explain any four attacks. (16)
2. Explain about the FPGA hardware security primitives. (16)
3. Explain the concept of FPGA Synthesis Flow and Its Vulnerabilities. (16)
4. Write a brief note on FPGA-based Applied Cryptography. (16)
5. Analyze the technical details of firewall and describe any three types of
firewall (16)
6. Analyze the performance MD5 with SHA-1 algorithm and give its
advantages. (16)
7. Analyze with example how the RSA algorithm is suitable for Digital Signature. (16)
8. Analyze the Encryption algorithms with suitable example. (16)
UNIT – V
1. Write short notes on DES algorithm and also give the implementation methods in
VLSI. (16)
2. Explain about IDEA AES algorithm. (16)
3. Explain about VLSI Implementation of AES algorithm. (16)
4. Explain the development of digital signature chip using RSA algorithm. (16)
5. Analyze with a suitable example how to implement DES algorithm in FPGA. (16)
6. Explain about Digital signature and also give an implementation method using FPGA.
----------

More Related Content

What's hot

Cryptography
CryptographyCryptography
CryptographyAmbuj Rai
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2
Techglyphs
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunneling
Kevin Ndemo
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
Journal For Research
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
MLG College of Learning, Inc
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESRMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
ijcisjournal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
IOSR Journals
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epulAgate Studio
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
IJCNCJournal
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
Ben Catchpole
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 

What's hot (16)

Cryptography
CryptographyCryptography
Cryptography
 
Bt0088 cryptography and network security2
Bt0088 cryptography and network security2Bt0088 cryptography and network security2
Bt0088 cryptography and network security2
 
Cryptographic tunneling
Cryptographic tunnelingCryptographic tunneling
Cryptographic tunneling
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESRMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 

Viewers also liked

Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner
The American Occupational Therapy Association
 
Franquia de Marketing Digital
Franquia de Marketing DigitalFranquia de Marketing Digital
Franquia de Marketing Digital
WSI Masters Brasil
 
Raisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceRaisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceDavid Breton
 
Fractal
FractalFractal
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
Sistemas de control para ingenieria.  3ra edición  Norman S. NiseSistemas de control para ingenieria.  3ra edición  Norman S. Nise
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
diego062
 
B c f section 6
B c f section 6B c f section 6
B c f section 6
Saeed Ahmed Soomro
 
Anna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da criseAnna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da crise
Landoaldo Lima
 
Automobile safety seminar report
Automobile safety seminar reportAutomobile safety seminar report
Automobile safety seminar report
Deepak kango
 

Viewers also liked (10)

smoking-final (2)
smoking-final (2)smoking-final (2)
smoking-final (2)
 
Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner Interprofessional collaboration with an unlikely partner
Interprofessional collaboration with an unlikely partner
 
Franquia de Marketing Digital
Franquia de Marketing DigitalFranquia de Marketing Digital
Franquia de Marketing Digital
 
Kieran mccloskey
Kieran mccloskeyKieran mccloskey
Kieran mccloskey
 
Raisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_ReferenceRaisbeck_King_Air_Pocket_Reference
Raisbeck_King_Air_Pocket_Reference
 
Fractal
FractalFractal
Fractal
 
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
Sistemas de control para ingenieria.  3ra edición  Norman S. NiseSistemas de control para ingenieria.  3ra edición  Norman S. Nise
Sistemas de control para ingenieria. 3ra edición Norman S. Nise
 
B c f section 6
B c f section 6B c f section 6
B c f section 6
 
Anna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da criseAnna marras - Palestra: Vender e empreender além da crise
Anna marras - Palestra: Vender e empreender além da crise
 
Automobile safety seminar report
Automobile safety seminar reportAutomobile safety seminar report
Automobile safety seminar report
 

Similar to Security solutions in vlsi design

Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
vaidheeswari
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
YogeshDhamke2
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
3 ec2352 – computer networks
3  ec2352 – computer networks3  ec2352 – computer networks
3 ec2352 – computer networks
vmspraneeth
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
smumbahelp
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network security
Vinod Kumar Gorrepati
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
Selva Kumar
 
IS - SSL
IS - SSLIS - SSL
Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
Networkin new
Networkin newNetworkin new
Networkin newrajujast
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
Sachin Tripathi
 
Moein
MoeinMoein
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Young Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Tony Nguyen
 

Similar to Security solutions in vlsi design (20)

Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
R09 information security – ii
R09 information security – iiR09 information security – ii
R09 information security – ii
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
3 ec2352 – computer networks
3  ec2352 – computer networks3  ec2352 – computer networks
3 ec2352 – computer networks
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network security
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-4-unit-5-for-ma...
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Ip security
Ip security Ip security
Ip security
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Networkin new
Networkin newNetworkin new
Networkin new
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Moein
MoeinMoein
Moein
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

More from Raja pirian

Bt action words
Bt action wordsBt action words
Bt action words
Raja pirian
 
Micro Processor And Micro controller
Micro Processor And Micro controller Micro Processor And Micro controller
Micro Processor And Micro controller
Raja pirian
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
Raja pirian
 
Micro proccesor practical course plan
Micro proccesor practical course planMicro proccesor practical course plan
Micro proccesor practical course plan
Raja pirian
 
Smart india hackathon 2018
Smart india hackathon 2018Smart india hackathon 2018
Smart india hackathon 2018
Raja pirian
 
Adhoc qb14 (1)
Adhoc qb14 (1)Adhoc qb14 (1)
Adhoc qb14 (1)
Raja pirian
 

More from Raja pirian (6)

Bt action words
Bt action wordsBt action words
Bt action words
 
Micro Processor And Micro controller
Micro Processor And Micro controller Micro Processor And Micro controller
Micro Processor And Micro controller
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Micro proccesor practical course plan
Micro proccesor practical course planMicro proccesor practical course plan
Micro proccesor practical course plan
 
Smart india hackathon 2018
Smart india hackathon 2018Smart india hackathon 2018
Smart india hackathon 2018
 
Adhoc qb14 (1)
Adhoc qb14 (1)Adhoc qb14 (1)
Adhoc qb14 (1)
 

Recently uploaded

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

Security solutions in vlsi design

  • 1. KINGS COLLEGE OF ENGINEERING M.E. VLSI DESIGN VL7002 – Security Solutions in VLSI – Prepared By P.Raja Pirian(9994009225) IMPORTANT QUESTIONS PART - A 1. Specify the four categories of security threads? 2. Define data security. 3. What are the requirements of a hash function? 4. What is the main advantage of AES over DES? 5. List any two design goals for a firewall. 6. List the benefits of IP Security. 7. Define information flow. 8. Define integrity and non repudiation. 9. Name the processing steps involved in MD5 logic? 10. How secure is DES? 11. What are the purpose of dual signature? 12. Define Electronic Code Book. 13. Specify the four categories of security threads. 14. Define threat and attack. 15. Give the various types of Biometrics. 16. What are the properties of Digital Signature? 17. What is meant by Firewall? 18. Which attack is related to integrity? 19. Which attack is related to confidentiality? 20. What are the requirements of a hash function? 21. Define Stream Cipher. 22. What is the purpose of the S-boxes in DES? 23. What is the use of trusted system? 24. Specify the four categories of security threads? 25. Give few file system securities. 26. List out the two ways in which password can be protected. 27. List out different active attacks. 28. Differentiate symmetric and asymmetric encryption? 29. Compare Substitution and Transposition techniques.
  • 2. 30. How is the S-box constructed? 31. What is the main advantage of AES over DES? 32. Define Hash function. 33. Define Glitch analysis. 34. What is the use of Physical Unclonable Function? 35. Define digital signature. 36. Will the AES replace DES? 37. Define Bit stream level theft. 38. What do you meant by side channel attack? 39. Give the different key sizes of AES algorithm? 40. Give the features of IDEA AES algorithm PART – B ( 3 X 20 = 80) UNIT - 1 1. Explain detail about the security mechanisms in OS. (16) 2. Discuss various data communication procedure. (16) 3. Explain various physical security threats and controls. (16) 4. Explain the meaning of computer security. (16) 5. Explain various security threats in networks. (16) 6. Write short Notes on Data security and Computer System Security. (16) 7. Explain various security mechanism in Operating System. 8. Explain the meaning and concept of computer security. UNIT - II 9. Explain detail about various Biometric Systems. (16) 10. Discuss the various aspects in system security. (16) 11. Explain in detail about Vulnerabilities, Threats, Attacks, and Controls (16) 12. Discuss about various computer system security levels and polices. (16) 13. Explain the algorithm for Triple DES algorithm. (16) 14. Explain about MD5 Message Digest Algorithm. (16) 15. Give any 4 conventional techniques used for cryptography. (13) 16. Explain about RSA algorithm in detail. (13)
  • 3. UNIT - III 1. Analyze the methodology of a three key encryption and decryption technique. (16) 2. Analyze strength of RSA algorithm in detail with an example. (16) 3. Convert “MEET ME” using Hill cipher with the key matrix Convert the cipher text back to plaintext. (16) 4. Analyze the confidential level of Data Encryption Standard (DES) in detail. (16) 5. Analyze the attacks on Packet Filtering Firewall. (16) 6. With a net diagram explain about Virtual Private Network. (16) 7. Explain the concept of trusted systems. (16) 8. Give the different cyber laws used for e- commerce. (16) UNIT –IV 1. List the recent attacks on networks and explain any four attacks. (16) 2. Explain about the FPGA hardware security primitives. (16) 3. Explain the concept of FPGA Synthesis Flow and Its Vulnerabilities. (16) 4. Write a brief note on FPGA-based Applied Cryptography. (16) 5. Analyze the technical details of firewall and describe any three types of firewall (16) 6. Analyze the performance MD5 with SHA-1 algorithm and give its advantages. (16) 7. Analyze with example how the RSA algorithm is suitable for Digital Signature. (16) 8. Analyze the Encryption algorithms with suitable example. (16) UNIT – V 1. Write short notes on DES algorithm and also give the implementation methods in VLSI. (16) 2. Explain about IDEA AES algorithm. (16) 3. Explain about VLSI Implementation of AES algorithm. (16) 4. Explain the development of digital signature chip using RSA algorithm. (16) 5. Analyze with a suitable example how to implement DES algorithm in FPGA. (16) 6. Explain about Digital signature and also give an implementation method using FPGA. ----------