CB3491 Important Questions 4g
CB3491 Important Questions 4g
Unit -2
1. Using Euclid's Algorithm, find the GCD of (21,300)
2. Define the following terms in number theory
(i) Fields
(ii) Ring
(iii) Groups
3.What is avalanche effect?
4.Differentiate DES and AES
5.Differentiate linear and differential cryptanalysis.
UNIT -3
1. State Fermat's Little Theorem. Check whether 7 is prime or not? Consider a= 3.
2. State Euler's Totient function. Calculate Euler's Totient function for the number 12.
3. What is an elliptic curve?
4. What is prime and relative prime number?
5. State Miller's Primality test. Is 17 prime ?
UNIT —4
1.Differentiate MAC and Hash function
2.What is digital signature?
3.What are the types and requirements of authentication protocol?
4. Differentiate MD4 and SHA
5.Explain biometric and password protection authentication entity.
UNIT-5
1. What is spyware?
2. What is password sniffing?
3. Differentiate hardware and software keyloggers
4. What is NAC?
5. Write a short note on handshake protocol.
Unit -2
1. Draw and Explain the function of DES and 1010000010 to cipher text using DES.(13)
(Or)
2. (A) Explain the various Block cipher modes of
operations. (6)
(B) What is pseudorandom number generators?
How is it used to find key distribution in RC4
Algorithm? (7)
Unit-3
1. (A) State Chinese Remainder Theorem. Using Chinese Remainder theorem find X for
the given
set of congruent equations X = 2 (mod 3) , X = 3(mod 5) and X = 2 (mod 7) (7 Marks)
(B) Explain Diffie Hellman Key Exchange algorithm with example.(6Marks)
(or)
2. (A) Explain RSA algorithm. Perform Encryption and Decryption using RSA
algorithm for p=7,
q=ll , and M=9. (7marks)
(B) Discuss Elliptic curve cryptography (6 marks)
Unit —4
1. (A) Explain the format of the X.509 certificate (7)
(B) What is Kerberos? Explain how it provides
authenticated service? (6)
or
2. (A) Write down the steps involved in Schnorr
digital signature scheme used for authentication. (7)
(B) Discuss Elgamal digital signature scheme (6)
Unit-5
1. (A) Explain the classification of cyber crimes. (7)
(B) Detail the methods used to prevent SQL injection attack.(6)
(or)
2.(A) Write a short note on NAC (Network Access
Protocol) (7)
(B) What is keylogger? Explain its types.(6)
ANSWERS FOR PART A (2 marks )
Unit 1: Introduction to Cryptography and Cyber Security
1. What is Cryptography and Cybersecurity?
o Cryptography is the practice of securing communication and information by
encoding it in such a way that only authorized parties can access it. For
example, using a Caesar cipher, the word "HELLO" can be encrypted as
"IFMMP" by shifting each letter by one position.
o Cybersecurity involves protecting systems, networks, and data from cyber
threats like hacking, malware, or data breaches. For instance, implementing
firewalls and antivirus software helps secure a system from unauthorized
access.
2. Define the following terms:
o Cipher: A mathematical algorithm used for encrypting and decrypting
messages. For instance, in a substitution cipher, each letter in the plaintext is
replaced with another letter.
o Key: A secret value used in encryption and decryption to ensure secure
communication. For example, a 128-bit key in AES encryption determines
how the data is scrambled.
o Encipher: The process of converting plaintext into ciphertext. For instance,
encoding "HELLO" into "KHOOR" using a Caesar cipher with a shift of 3.
o Decipher: The process of converting ciphertext back into plaintext. For
example, decoding "KHOOR" back to "HELLO" using the same Caesar
cipher.
3. Differentiate active and passive attacks.
o Active Attack: These attacks involve modification of data or creating false
data during transmission. For example, a man-in-the-middle attack intercepts
and alters the content of communication between two parties.
o Passive Attack: These involve monitoring and eavesdropping on
communication without altering the data. For instance, an attacker silently
intercepting an email to gather sensitive information.
4. What is steganography?
o Steganography is the technique of hiding secret information within non-secret
data, such as images, audio, or video files. For example, embedding a hidden
message inside an image by altering the least significant bits of the image
pixels.
5. What is a denial-of-service attack?
o A denial-of-service (DoS) attack aims to overwhelm a system, network, or
server with excessive requests, rendering it unavailable to legitimate users. For
instance, flooding a web server with so many requests that it crashes or slows
down significantly.
Unit 5: Cybersecurity
1. What is spyware?
o Spyware is malicious software that secretly collects user information.
Example: A keylogger records keystrokes to steal passwords.
2. What is password sniffing?
o Password sniffing is intercepting passwords during transmission. Example:
Using network monitoring tools like Wireshark.
3. Differentiate hardware and software keyloggers:
o Hardware Keylogger: A physical device attached to a computer. Example: A
USB keylogger.
o Software Keylogger: A program installed on the system. Example: Malware
that logs keystrokes.
4. What is NAC?
o Network Access Control ensures that only authorized devices can access the
network. Example: Restricting guest devices on an enterprise network.
5. Handshake Protocol:
o A handshake protocol is used to establish secure communication between
devices. Example: SSL handshake ensures both parties authenticate each other.