KNOWLEDGE INSTITUTE OF TECHNOLOGY, SALEM 637 504
(An Autonomous Institution)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CS8792 – CRYPTOGRAPHY AND NETWORK SECURITY
Question Bank
UNIT I
PART A
1. What is cryptography?
2. Define security attack and mechanism?
3. Draw a matrix that shows the relationship between security services and security mechanisms.
4. What is meant by passive and active attack?
5. What is meant by Steganography?
6. What is meant by Brute force attack?
7. List out the problem of one time pad?
8. What is avalanche effect?
9. Calculate the cipher text for the following using one time pad cipher. Plain text: ROCK &
Keyword: BOTS.
10. What are the components of Cryptosystem?
11. What is Cryptanalysis?
12. Distinguish between attack and threat
13. Define Diffusion and confusion.
14. Define integrity and Non - repudiation?
15. What is meant by transposition technique?
16. Convert the given text “Anna University” into cipher text using rail fence technique?
17. Applying Caesar Cipher and k=5 decrypt the given Cipher Text
“YMJTYMJWXNIJTKXNQJSHJ”.
PART B
1. Explain Network Security Model with a neat diagram.
2. What are the different types of attacks? Explain?
3. Describe the various security services and security mechanisms.
4. Explain OSI security Architecture model with neat diagram.
5. Explain the Cesar cipher, monoalphabetic cipher and Polyalphabetic cipher with example?
6. Encrypt the message “PAY” using hill cipher with the following key matrix K=
(17 17 5 21 18 21 2 2 19 ) and show the decryption to get the original plain text.
7. Encrypt the following using play fair cipher using the keyword MONARCIIY. "SWARAJ IS
MY BIRTH RIGHT'. Use X for blank spaces.
8. Explain Encryption & decryption of Hill Cipher for the following. Message PEN and Key:
ACTIVATED
9. Describe the Transposition Techniques in detail.
10. What is steganography? Describe the various techniques used in steganography.
11. Applying Vigenere Cipher, encrypt the word “explanation” using the key “leg”.
UNIT II
PART A
1. Differentiate public key and conventional encryption?
2. What are the principle elements of a public key cryptosystem?
3. Specify the applications of the public key cryptosystem?
4. What is a one way function?
5. List four general characteristics of schema for the distribution of the public key?
6. Find gcd (1970, 1066) using Euclid’s algorithm?
7. Differentiate stream cipher and block cipher.
8. What are the modes of DES?
9. State few applications of RC4 algorithm.
10. Is it possible to use the DES algorithm to generate message authentication code? Justify
11. What is avalanche effect?
12. List the parameters (block size, key size and no of rounds) for the three AES versions
13. Give the five modes of operations in block cipher.
14. Difference between DES and AES.
15. List out the parameters of AES.
16. Difference between linear and differential cryptanalysis?
17. Define a Group, a Ring and a Field.
PART B
1. Find multiplicative inverse of 457 mod 896.
2. Write down Triple DES algorithm and explain with neat diagram
3. Describe the working principles of simple DES with an example.
4. Discuss in detail the encryption and decryption process of AES.
5. Brief out the encryption and decryption process of DES and depict the general structure. List
out the strength and weakness of the same.
6. Explain various block modes of operation in detail. Compare it.
7. Describe in detail the key generation in AES algorithm and its expansion format.
8. Compare encryption and decryption process of AES and DES.
9. Discuss the properties that are to be satisfied by Groups, Rings and Fields.
10. For each of the following elements of DES, indicate the comparable element in AES if available.
11. Identify the purpose of Differential and linear cryptanalysis and explain with neat diagram.
12. XOR of sub key material with the input to the function.
i. f function.
ii. Permutation p.
iii. Swapping of halves of the block
UNIT III
PART A
1. Define replay attack.
2. Write the difference between public key and private key crypto systems?
3. State whether symmetric and asymmetric cryptographic algorithms need key exchange?
4. List the Authentication requirements?
5. Point out the types of cryptanalytic attacks?
6. What is Man in the Middle attack?
7. Specify the various types of authentication protocols.
8. What is the Fermat’s theorem?
9. Describe Chinese remainder theorem.
10. Define Euler’s theorem and its application?
11. What is discrete Logarithm?
12. Perform encryption and decryption using RSA Alg. for the following. P=7; q=11; e=17; M=8.
13. What is an elliptic curve?
14. Mention any three Primality Testing Methods.
PART B
1. Write short notes on Fermat’s theorem, Euler’s theorem and Chinese remainder theorem?
2. State Chinese Remainder theorem and find X for the given set of congruent equations Using
CRT.
X=2(mod 3)
X=3(mod 5)
X=2(mod 7)
3. Explain about the RSA algorithm with the example as : P=11, Q=5, E=3, PT=9
4. Explain Diffie Hellman algorithm with an example.
5. Users A and B use the Diffie-Hellman key exchange technique with a common prime q=71 and
a primitive root a=7. If user A has private key XA=5, what is A’s public key YA?.
6. With a neat sketch explain the Elliptic curve cryptography with an example.
7. Why ECC is better the RSA? However, why is it not widely used? Defend it.
8. Describe the Key generation, encryption, and decryption in ElGamal.
UNIT IV
PART A
1. What are the functions used to produce an authenticator?
2. List the properties a digital signature should possess?
3. What do you mean by MAC?
4. What is meant by Hash function?
5. Mention the fundamental idea of HMAC.
6. What do you mean by one way property in hash function?
7. What are the two approaches of digital signature?
8. What is weak collision Resistance?
9. What is the role of compression function in hash function?
10. How is the security of a MAC function expressed?
11. Mention the significance of signature function in Digital Signature Standard (DSS) approach.
12. How a digital signature differs from authentication protocols?
13. Define the term message digest.
14. Contrast various SHA algorithms.
15. What is the message digest size and message size for SHA-256?
16. What are birthday attacks?
17. State the requirements of Kerberoes.
18. Write a simple authentication dialogue used in Kerberos.
19. List any 2 applications of X.509 Certificates.
20. List the 3 classes of intruder?
21. State the requirements of a digital signature.
22. Compare Direct and Arbitrated digital signature.
PART B
1. Illustrate about SHA algorithm and explain?
2. Write a detailed note on digital signatures?
3. Describe about hash functions?
4. Briefly explain the steps of message digest generation in Whirlpool with a block diagram
5. Explain Digital signature with Elgamal Public key crypto systems?
6. Explain Digital signature standard with key generation and verification.
7. Write down the steps involved in
i. EIgamaI Digital Signature Scheme.
ii. Schnorr Digital Signature Scheme.
8. Discuss the different methods involved in authentication of the source
9. Write about how the integrity of message is ensured without source authentication.
10. List the design objectives of HMAC and explain the algorithm in detail.
11. Assume a client C wants to communicate with a server S using Kerberos protocol. How can it
be achieved?
12. Explain briefly about the architecture and certification mechanisms in kerberos.
13. Explain X.509.
14. Illustrate Password-based authentication.
UNIT V
PART A
1. What are the services provided by PGP services?
2. List the limitations of SMTP/RFC 822?
3. What are the headers fields define in MIME?
4. What you mean by Verisign certificate?
5. Give the benefits of IP security?
6. General format of IPsec ESP Format?
7. Differentiate Transport and Tunnel mode in IPsec?
8. What are the different between SSL version 3 and TLS?
9. Expand and define SPI.
10. Specify the purpose of ID Payload in Phase I and Phase II inherent in ISAKMP/ IKE Encoding.
11. Justify the following statement, "With a Network Address Translation (NAT) box, the
computers on your internal network do not need global IPV4 addresses in order to connect to
the Internet”.
12. List the design goals of firewalls?
13. What are the effects of malicious software?
14. Write a short note on Spammers and Key loggers.
15. What is worm?
16. State the difference between threats and attacks.
17. What is a Threat? List their types.
18. What is an intruder?
19. What are Zombies?
PART B
1. Write short notes on Viruses & Firewalls. Counter measures of virus.
2. Write about virus and related threats in detail.
3. Explain how secure electronic transaction (SET) protocol enables e-transactions in details.
Explain the components involved.
4. Explain the operational description of PGP.
5. Write Short notes on S/MIME.
6. Explain the architecture of IP security.
7. Write short notes on authentication header and ESP.
8. Explain in detail the operation of Secure Socket Layer (SSL/TLS) in detail.
9. Discuss in detail about IP Security architecture and the services offered by IPSec.
10. Discuss the different types of virus in detail. Suggest scenario for deploying these in network
scenario.
11. How does screened host architecture for firewalls differ from screened subnet firewall
architecture? Which offers more security for information assets on trusted network? Explain
with neat sketch.