Sunteți pe pagina 1din 10

www.vidyarthiplus.

com
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur-603203
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year: 2016 -17
QUESTION BANK - ODD SEMESTER

NAME OF THE SUBJECT


SUBJECT CODE
SEMESTER
YEAR
DEPARTMENT
HANDLED & PREPARED BY

CRYPTOGRAPHY AND NETWORK SECURITY


CS6701
VII
IV
Information Technology
Mr.S.Sekar, A.P(Sr.G) & Mr.K.Elaiyaraja, A.P(Sr.G)
UNIT I
PART-A

Q.No Question

Competence

Level

Differentiate between Active attacks and Passive Attacks

Understanding

BTL-2

Define Steganography

Remembering

BTL-1

State Eulars theorem.

Remembering

BTL-1

Define cryptanalysis.

Remembering

BTL-1

Compare Substitution and Transposition techniques.

Analysing

BTL-4

Why Random numbers are used in Network Security

Analysing

BTL-4

Classify the four categories of security threats

Analysing

BTL-4

Find 117 mod 13.

Applying

BTL-3

Define primitive root.

Remembering

BTL-1

10

What is traffic padding? What is its purpose?

Understanding

BTL-2

11

Define cryptography

Remembering

BTL-1

12

Why Modular arithmetic has been used in cryptography?

Evaluating

BTL-5

13

Compare Block and Stream cipher.

Understanding

BTL-2

14

Illustrate the two basic functions used in encryption algorithms.

Applying

BTL-3

15

Discuss: security mechanism.

Understanding

BTL-2

16

Decipher the following cipher Text using brute force attack:


CMTMROOEOORW (Hint: Algorithm-Rail fence)

Creating

BTL-6

17

Why network need security.

Applying

BTL-3

18

Give an example each for substitution and transposition ciphers

Understanding

BTL-2

19

Convert the Given Text VALLIAMMAI into cipher text using Rail fence
Technique.

Evaluating

BTL-5

20

Prepare the list of keys are required for two people to communicate via a cipher?

Creating

BTL-6

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 1 of 10

www.vidyarthiplus.com
PART-B
Q.No Question
(i)State and Drive Fermats theorem & Eulars theorem (8)
(ii)Explain the different security mechanisms focused by OSI security
architecture (8)
(i) Describe the substitution Techniques in detail (8)
2
(ii) Describe the Transposition Techniques in detail (8)
(i) What are the different types of attacks? Explain. (8)
3
(ii) State and explain Chinese remainder theorem with example. (8)
(i)
(i)Find 321 mod 11 using Fermats theorem. (4)
4
(ii)Find GCD using Eulars Theorem with Example. (6)
(ii)Find GCD of 1070 and 1066 using Euclid algorithm. (6)
(i)Encrypt the message PAY using hill cipher with the following key matrix
and show the decryption to get original plain text.(8)
| 17 17 5 |
5
K= | 21 18 21 |
| 2 2 19 |
(ii)Explain classical encryption techniques with symmetric cipher model.(8)
Explain the following in detail
6
(i) Modular Exponentiation (8)
(ii) Finite fields (8)
(i)Given Cipher text YMJTYMJWXNIJTKXNQJSHJ, knowing the message is
7
encrypted by Caesar cipher and k=5. Try to decrypt the message.
(8)
(ii)Using Vigenere cipher, encrypt the word explanation using the key leg. (8)
(i)Discuss briefly the Discrete Algorithms. (8)
8
(ii)Explain the following.
Groups, Rings and Field .
(8)
Differentiate between transposition cipher and substitution cipher. Apply two
9
stage transpositions Cipher on the treat diagrams as single units using the
keyword sequence.
(i)What is Steganography? Briefly explain any three techniques used. (8)
10
(ii)What is mono-alphabetic cipher? How it is different from Caesar cipher? (8)
(i) State the rules to perform encryption using playfair cipher and encrypt
snowshooos using monarchy I and J count as one letter and x is the filler
11
letter.(8)
(ii)Encrypt the word Semester Result with the keyword Examination using
playfair cipher.(8)
(i)With a neat block diagram, Generalize the network security model and the
important parameters associated with it.(8)
12
(ii)Distinguish between active and passive security attacks. Categorize these
attacks and explain one examples of each (8)
(i) (i) State and explain Chinese Remainder theorem. Using the same, find an
integer that has a remainder of 3 when divided by 7,4 when divided by 13 but
13
is divisible by 12. (8)
(ii) (ii) Discuss the Euclids Algorithm. (8)
(i)Explain the following
a) Message Integrity (2)
b) Denial of Service (2)
14
c) Availability (2)
d) Authentication (2)
(ii)To find 1113 mod 53 using modular exponentiation. (8)
1

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Understanding

BTL-2

Remembering

BTL-1

Remembering

BTL-1

Evaluating

BTL-5

Creating
&
Analyzing

BTL-6
&
BTL-4

Understanding

BTL-2

Applying

BTL-3

Understanding
&
Understanding

BTL-2

Analyzing

BTL-4

Remembering

BTL-1

Applying

BTL-3

Creating
&
Analyzing

BTL-6
&
BTL-4

Analyzing

BTL-4

Remembering

BTL-1

Page 2 of 10

www.vidyarthiplus.com
UNIT II
PART-A
Q.No Question

Competence

Level

Define RC5.

Remembering

BTL-1

What are the five modes of operation of block cipher?

Remembering

BTL-1

State whether symmetric and asymmetric cryptographic algorithm need key


exchange.

Analyzing

BTL-4

State few application of RC5 algorithm.

Understanding

BTL-2

What primitive operations are used in RC5?

Understanding

BTL-2

Why is the middle portion of triple DES a decryption rather than encryption?

Analyzing

BTL-4

What is avalanche effect?

Remembering

BTL-1

Is it possible to use the DES algorithm to generate message authentication code?


Justify.

Analyzing

BTL-4

Differentiate between sub bytes and sub words.

Applying

BTL-3

10

What is triple encryption? How many keys are used in triple encryption?

Understanding

BTL-2

11

Tell the applications of the public key crypto systems.

Remembering

BTL-1

12

Prepare any one technique attacking in RSA.

Creating

BTL-6

13

Differentiate public key and conventional encryption.

Applying

BTL-3

14

What is the purpose of Diffie Hellman key exchange?

Understanding

BTL-2

15

Name the principle elements of a public key crypto system?

Remembering

BTL-1

16

List four general characteristics of schema for the distribution of the public key.

Applying

BTL-3

Evaluating

BTL-5

Evaluating

BTL-5

17
18

What requirements must a public key crypto system to fulfil to a secured


algorithm?
Perform encryption and decryption using RSA algorithm for the following.
p=7, q=11; e=17; m=8

19

Are strong primes necessary in RSA?

Creating

BTL-6

20

What are the roles of public and private key?

Remembering

BTL-1

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 3 of 10

www.vidyarthiplus.com
PART-B
Q.No Question
1

2
3
4
5

10

11

12

13

14

(i) Explain in detail, the key generation in AES algorithm and its expansion format.
(8)
(ii) Explain Triple DES and its applications.(8)
Describe the following modes of operation in block cipher.
(i) Electronic code book and Cipher block chaining. (8)
(ii) Cipher feedback mode and output feedback mode. (8)
(i) Explain about the single Round of DES algorithm. (10)
(ii) Describe the key discarding process of DES. (6)
(i) Explain the RC5 method used for encryption and decryption(8)
(ii) Explain Triple DES and its applications.(8)
(i)Draw the general structure of DES and explain how encryption and decryption are
carried out.(12)
(ii) Mention the strength of DES algorithm.(4)
(i)How meet in Meet in middle attack is performed on double Data Encryption
Standard.(8)
(ii)Explain the substitution bytes transformation and add round key transformation of
AES cipher(8)
(i) Explain how encryption is done using advanced encryption standard with
necessary diagram(8)
(ii)Explain in detail about Blowfish .(8)
Users A and B use the Diffie- Hellman key exchange technique, a common prime
q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3.What is As public key YA?
(ii)If user B has private key XB=6. What is Bs public key YB?
(iii) What is the shared secret key? Also write the algorithm.
(i) Explain RSA Algorithm.(8)
(ii)Demonstrate the encryption and decryption for the RSA algorithm parameters.
P=3, Q=11, E=7, d=?, M=5. (8)
(i) Discuss how discrete logarithm evaluated for a number? What is the role of
discrete log in the Diffie-Hellman key exchange in exchanging the secret key among
two users?(8)
(ii)What are elliptic curves? And also summarize how the elliptic curves are useful
for Cryptography?(8)
(i)Briefly explain the idea behind Elliptic Curve Cryptosystem.(8)
(ii)Explain the key management of public key encryption in detail.(8)
Describe the mathematical foundations of RSA algorithm. Perform encryption
decryption for the following.
P=17, q=7, e=5, n=119, message=6. Use Extended Euclids algorithm to find the
private key.
(i) User A and B use Diffie-Hellman key exchange a common prime q=71 and a
primitive root a=7.
If user A has private key XA=5, What is As public key YA
If user A has private key XB=12, What is Bs public key YB and What is shared
secret key? (8)
(ii)Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6
with a modules of P=11. Determine all the points in E11 (1, 6). Start by calculation
the right hand side of the equation of all the values of n? (8)
(i)Explain briefly about Diffie-Hellman key exchange algorithm with its pros and
cons. (10)
(ii) What is public key cryptography and when is it preferred?(6)

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Remembering

BTL-1

Analyzing

BTL-4

Creating

BTL-6

Remembering

BTL-1

Remembering

BTL-1

Analyzing

BTL-4

Understandin
g

BTL-2

Evaluating

BTL-5

Understandin
g

BTL-2

Understandin
g

BTL-2

Remembering

BTL-1

Applying

BTL-2

Applying

BTL-3

Analyzing

BTL-4

Page 4 of 10

www.vidyarthiplus.com
UNIT III
PART-A
Q.No

Question

Competence

Level

What are the requirements for message authentication?

Understanding

BTL-2

Define one way property in hash function?

Remembering

BTL-1

Distinguish between direct and arbitrated digital signature.

Analyzing

BTL-4

What is digital signature?

Remembering

BTL-1

What types of attacks are addressed by message authentication?

Creating

BTL-6

What are the properties a digital signature should have?

Remembering

BTL-1

What are the security services provided by digital signature?

Evaluating

BTL-5

Compare DSA and ElGamal algorithm.

Understanding

BTL-2

What you meant by MAC?

Remembering

BTL-1

10

What are the requirements of hash function?

Remembering

BTL-1

11

What is the block size of MD5?

Understanding

BTL-2

12

Differentiate MAC and hash function.

Analyzing

BTL-4

13

Differentiate between message authentication code and one way hash function.

Evaluating

BTL-5

14

Why is SHA more secure than MD5?

Applying

BTL-3

15

List any three hash algorithm.

Understanding

BTL-2

16

How digital signature is different from conventional? Give any two.

Creating

BTL-6

17

Define the classes of message authentication function.

Remembering

BTL-1

18

Compare MD5 and SHA algorithm.

Analyzing

BTL-4

19

List the authentication requirements.

Applying

BTL-3

20

What are the two approaches of digital signature?

Applying

BTL-3

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 5 of 10

www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6

(i)Where hash functions are used? What characteristics are needed in secure hash
function? write about the security of hash functions and MACs.(8)
(ii)Examine Digital signature with ElGamal public key cryptosystem.(8)
Describe digital signature algorithm and show how signing and verification is
done using DSS.
Explain the process of deriving eighty 64-bit words from 1024 bits for processing
Of a single blocks and also discuss single round function in SHA-512 algorithm.
Show the values of W16, W17, W18 and W19.
What is Digital Signature? Explain how it is created at the sender end and
retrieved at receiver end .differentiate digital signature from digital certificate.
(i)Describe HMAC algorithm in detail.(8)
(ii)Explain the classification of authtication function in detail.(8)
(i)Compare the features of SHA and MD5 algorithm(8)
(ii)Discuss about the objectives of HMAC and its security features(8)

Competence

Level

Remembering

BTL-1

Remembering

BTL-1

Evaluating

BTL-5

Understanding

BTL-2

Understanding

BTL-2

Creating

BTL-6

How MD5 method provide security to the system?Explain with suitable diagram.

Analyzing

BTL-4

Explain in detail ElGamal Public key cryptosystems with an example.

Remembering

BTL-1

What is meant by message digest and explain about HMAC digital signatures

Remembering

BTL-1

10

(i)Describe Secure Hash Algorithm algorithm to generate message digest in


detail.(12)
(ii) Compare its performance with MD5.(4)

Applying

BTL-3

11

Write a brief notes on X.509 authentication services.

Understanding

BTL-2

Applying

BTL-3

Analyzing

BTL-4

Analyzing

BTL-4

12
13
14

(i) Illustrate the security of hash functions and MACs.(8)


(ii)Demonstrate any one method of efficient implementation of HMAC. (8)
(i) Explain in detail message authentication code and its requirements.(8)
(ii) With a neat flowchart, Explain MD5 processing of a single 512 bit block.(8)
(i)Enumerate the properties of Hash Function.(8)
(ii)Describe the authentication protocol and list its limitations, how the
limitations overcome.(8)

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 6 of 10

www.vidyarthiplus.com
UNIT IV
PART-A
Q.No Question

Competence

Level

What are the Classes of message authentication function?

Evaluating

BTL-5

List the design goals of firewalls.

Analyzing

BTL-4

State the reasons to revoke a certificate before its expiry time.

Applying

BTL-3

Enlist commonly used firewalls from threats of security.

Analyzing

BTL-4

Define Worm.

Remembering

BTL-1

Differentiate spyware and virus.

Applying

BTL-3

Assume a client C wants to communicate with a server S using Kerberos


protocol .How can it be achieved?

Analyzing

BTL-4

What is intruder?

Applying

BTL-3

What are the advantages of intrusion detection system over firewall?

Remembering

BTL-1

10

Define: SET

Remembering

BTL-1

11

Define virus. Specify the types of viruses?

Understanding

BTL-2

12

Prepare a short note on application level gateway?

Creating

BTL-6

13

Define firewall.

Remembering

BTL-1

14

What is Kerberos? What are the uses?

Understanding

BTL-2

15

What do you mean by trusted systems?

Understanding

BTL-2

16

List 4 requirements were defined by Kerberos.

Remembering

BTL-1

17

List the 3 classes of Intruders.

Remembering

BTL-1

18

Does the firewall ensure 100% security to the system? Comment.

Evaluating

BTL-5

19

What is the role of Ticket Granting Server in inter realm operations of Kerberos?

Creating

BTL-6

20

What is the purpose of X.509 standard?

Understanding

BTL-2

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 7 of 10

www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6

10
11

12

13
14

Discuss elaborately how kerberos provides the different authentication services


with necessary diagrams.
(i) Explain the Firewall design principles.(8)
(ii) What are viruses? Explain the virus related threats and the counter measures
applied.(8)
Explain the various practical implementation of cryptography and security in
detail
(i) Explain the technical details of firewall. (8)
(ii)Illustrate the three common types of firewalls with diagrams. (8)
Explain in detail about Secure Electronic Transaction with neat diagram
(i)Discuss on the significant types of virus categories. (8)
(ii)What is a trusted system? Explain the basic concept of data access control in
trusted systems. (8)
(i) Explain briefly the architecture of distributed intrusion detection system with
the necessary diagrams. (8)
(ii) Explain about virus and related threats in detail. (8)
(i) Generalize the role of intrusion detection system? Point out the three benefits
that can be provided by the intrusion detection system? (8)
(ii) Prepare comparison details between statistical anomaly detection and rule
based intrusion detection system? (8)
(i)Explain the various roles of firewalls and related terminology in detail (8)
(ii)How does screened host architecture for firewalls differ from screened subnet
firewall architecture? Which offer more security for the information assets
remain on the trusted network? Explain with neat sketch?(8)
(i)Explain the roles of the different servers in Kerberos protocol. How does the
user get authenticated to the different servers?(8)
(ii)Explain briefly about trusted systems.(8)
(i) Classify the various measures that may be used for intrusion detection. (8)
(ii) Show How the encryption is key generated from password in Kerberos? (8)
(i)Explain with the help of an example how a users certificate is obtained from
another certification authority in X.509 scheme. (8)
(ii)Describe the authentication dialog used by Kerberos for obtaining services
from another realm. (8)
(i)List out the participants of SET system, and explain in detail. (8)
(ii)Explain firewalls and how they prevent intrusions(8)
Describe the different types of firewalls and its configuration in detail

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Understanding

BTL-2

Analyzing

BTL-4

Evaluating

BTL-5

Remembering

BTL-1

Remembering

BTL-1

Understanding

BTL-2

Analyzing

BTL-4

Analyzing

BTL-4

Analyzing

BTL-4

Understanding

BTL-2

Applying

BTL-3

Remembering

BTL-1

Applying

BTL-3

Remembering

BTL-1

Page 8 of 10

www.vidyarthiplus.com
UNIT V
PART-A
Q.No Question

Competence

Level

What is dual signature? What it is purpose?

Understanding

BTL-2

What are the services provided by PGP?

Understanding

BTL-2

Define S/MIME.

Remembering

BTL-1

Draw the header format for an ISAKMP message.

Remembering

BTL-1

What are the protocols used to provide IP security?

Analyzing

BTL-4

Give the applications of IP Security.

Remembering

BTL-1

What is meant by SET? What are the features of SET?

Understanding

BTL-2

Why is R64 conversion useful for email generation?

Analyzing

BTL-4

What are the steps involved in SET Transactions?

Remembering

BTL-1

10

Why email compatibility function in PGP needed

Remembering

BTL-1

11

What is tunnel mode in IP security?

Understanding

BTL-2

12

What are the elements of MIME?

Remembering

BTL-1

13

Why does PGP generate a signature before Apply compression?

Creating

BTL-6

14

What services are provided by IPSec?

Applying

BTL-3

15

Expand and define SPI.

Understanding

BTL-2

16

How can the signed data entity of S/MIME be prepared? Write the steps

Applying

BTL-3

17

Differentiate between transport mode and tunnel mode.

Evaluating

BTL-5

18

What is the purpose of SSL alert protocol?

Remembering

BTL-1

19

Why does ESP include a padding field?

Applying

BTL-3

20

Give the reason for using PGP.

Understanding

BTL-2

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 9 of 10

www.vidyarthiplus.com
PART-B
Q.No
1

3
4
5
6
7
8

10

11

12
13
14

Question
(i) How does PGP provide authentication and confidentiality for email services
and for file transfer applications? Draw the block diagram and explain the
components. (8)
(ii) Explain the general format of PGP message. (8)
(i) Summarize the Operations of PGP? Brief the various services provided by
PGP. (8)
(ii) Discuss the threats faced by an e-mail and explain its security requirements
to provide a secure e-mail service.(8)
(i) Describe about the PKI. (8)
(ii) Describe the ISAKMP format with diagrams.(8)
(i) Summarize about the authentication header of IP.
(8)
(ii) Discuss about encapsulating security payload of IP
(8)
(i) List the different protocols of SSL. Explain in detail Handshake protocol.(8)
(ii) Tell how does the server get authenticated to client in SSL?(8)
Explain IPSec protocols in detail .Also develop applications and advantages of
IPSec.
(i) What is the importance of web security? Explain how secure socket layer
provides the reliable service.(8)
(ii) Briefly explain about Transport Level Security.(8)
(i) Sketch and analyze the IPSec Document Overview diagram.
(8)
(ii) Draw and explain PGP Cryptographic function for Authentication.
(8)
(i) What is PGP? Examine how authentication and confidentiality is maintained
in PGP. (8)
(ii) Explain the key rings and its significance in PGP. Show how the message
generation from sender to receiver and explain with suitable diagram. (8)
(i) Draw the IP security authentication header and describe the functions of each
field. (8)
(ii) What is transport mode and tunnel mode authentication in IP? Describe how
ESP is applied to both these modes? (8)
(i) What do you mean by Security Association? Illustrate the parameters that
identify the Security Association. (8)
(ii) What is a dual signature and what is its purpose? With neat block diagram
illustrate the Secure Electronic Transaction.(8)
(i) Differentiate between transport modes vs. tunnel mode encryption in
IPsec.(8)
(ii) With a neat diagram, Describe handshake protocol in SSL.(8)
(i) Analyze the Cryptographic algorithms used in S/MIME. (8)
(ii) Explain S/MIME certification processing. (8)
(i) Describe importance of RADIX-64 conversion. (8)
(ii) Describe IP security Architecture. (8)
Verified by

: 1.
[
3.
[

Forwarded by Year Coordinator

Approved by HOD

Competence

Level

Evaluating

BTL-5

Understanding

BTL-2

Remembering

BTL-1

Understanding

BTL-2

Remembering

BTL-1

Creating

BTL-6

Remembering

BTL-4

Analyzing

BTL-4

Applying

BTL-3

Remembering

BTL-1

Applying

BTL-3

Understanding

BTL-2

Analyzing

BTL-4

Remembering

BTL-1

2.
[

4.
[

***************
SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 10 of 10

S-ar putea să vă placă și