Documente Academic
Documente Profesional
Documente Cultură
com
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur-603203
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year: 2016 -17
QUESTION BANK - ODD SEMESTER
Q.No Question
Competence
Level
Understanding
BTL-2
Define Steganography
Remembering
BTL-1
Remembering
BTL-1
Define cryptanalysis.
Remembering
BTL-1
Analysing
BTL-4
Analysing
BTL-4
Analysing
BTL-4
Applying
BTL-3
Remembering
BTL-1
10
Understanding
BTL-2
11
Define cryptography
Remembering
BTL-1
12
Evaluating
BTL-5
13
Understanding
BTL-2
14
Applying
BTL-3
15
Understanding
BTL-2
16
Creating
BTL-6
17
Applying
BTL-3
18
Understanding
BTL-2
19
Convert the Given Text VALLIAMMAI into cipher text using Rail fence
Technique.
Evaluating
BTL-5
20
Prepare the list of keys are required for two people to communicate via a cipher?
Creating
BTL-6
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 1 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
(i)State and Drive Fermats theorem & Eulars theorem (8)
(ii)Explain the different security mechanisms focused by OSI security
architecture (8)
(i) Describe the substitution Techniques in detail (8)
2
(ii) Describe the Transposition Techniques in detail (8)
(i) What are the different types of attacks? Explain. (8)
3
(ii) State and explain Chinese remainder theorem with example. (8)
(i)
(i)Find 321 mod 11 using Fermats theorem. (4)
4
(ii)Find GCD using Eulars Theorem with Example. (6)
(ii)Find GCD of 1070 and 1066 using Euclid algorithm. (6)
(i)Encrypt the message PAY using hill cipher with the following key matrix
and show the decryption to get original plain text.(8)
| 17 17 5 |
5
K= | 21 18 21 |
| 2 2 19 |
(ii)Explain classical encryption techniques with symmetric cipher model.(8)
Explain the following in detail
6
(i) Modular Exponentiation (8)
(ii) Finite fields (8)
(i)Given Cipher text YMJTYMJWXNIJTKXNQJSHJ, knowing the message is
7
encrypted by Caesar cipher and k=5. Try to decrypt the message.
(8)
(ii)Using Vigenere cipher, encrypt the word explanation using the key leg. (8)
(i)Discuss briefly the Discrete Algorithms. (8)
8
(ii)Explain the following.
Groups, Rings and Field .
(8)
Differentiate between transposition cipher and substitution cipher. Apply two
9
stage transpositions Cipher on the treat diagrams as single units using the
keyword sequence.
(i)What is Steganography? Briefly explain any three techniques used. (8)
10
(ii)What is mono-alphabetic cipher? How it is different from Caesar cipher? (8)
(i) State the rules to perform encryption using playfair cipher and encrypt
snowshooos using monarchy I and J count as one letter and x is the filler
11
letter.(8)
(ii)Encrypt the word Semester Result with the keyword Examination using
playfair cipher.(8)
(i)With a neat block diagram, Generalize the network security model and the
important parameters associated with it.(8)
12
(ii)Distinguish between active and passive security attacks. Categorize these
attacks and explain one examples of each (8)
(i) (i) State and explain Chinese Remainder theorem. Using the same, find an
integer that has a remainder of 3 when divided by 7,4 when divided by 13 but
13
is divisible by 12. (8)
(ii) (ii) Discuss the Euclids Algorithm. (8)
(i)Explain the following
a) Message Integrity (2)
b) Denial of Service (2)
14
c) Availability (2)
d) Authentication (2)
(ii)To find 1113 mod 53 using modular exponentiation. (8)
1
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Understanding
BTL-2
Remembering
BTL-1
Remembering
BTL-1
Evaluating
BTL-5
Creating
&
Analyzing
BTL-6
&
BTL-4
Understanding
BTL-2
Applying
BTL-3
Understanding
&
Understanding
BTL-2
Analyzing
BTL-4
Remembering
BTL-1
Applying
BTL-3
Creating
&
Analyzing
BTL-6
&
BTL-4
Analyzing
BTL-4
Remembering
BTL-1
Page 2 of 10
www.vidyarthiplus.com
UNIT II
PART-A
Q.No Question
Competence
Level
Define RC5.
Remembering
BTL-1
Remembering
BTL-1
Analyzing
BTL-4
Understanding
BTL-2
Understanding
BTL-2
Why is the middle portion of triple DES a decryption rather than encryption?
Analyzing
BTL-4
Remembering
BTL-1
Analyzing
BTL-4
Applying
BTL-3
10
What is triple encryption? How many keys are used in triple encryption?
Understanding
BTL-2
11
Remembering
BTL-1
12
Creating
BTL-6
13
Applying
BTL-3
14
Understanding
BTL-2
15
Remembering
BTL-1
16
List four general characteristics of schema for the distribution of the public key.
Applying
BTL-3
Evaluating
BTL-5
Evaluating
BTL-5
17
18
19
Creating
BTL-6
20
Remembering
BTL-1
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 3 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
10
11
12
13
14
(i) Explain in detail, the key generation in AES algorithm and its expansion format.
(8)
(ii) Explain Triple DES and its applications.(8)
Describe the following modes of operation in block cipher.
(i) Electronic code book and Cipher block chaining. (8)
(ii) Cipher feedback mode and output feedback mode. (8)
(i) Explain about the single Round of DES algorithm. (10)
(ii) Describe the key discarding process of DES. (6)
(i) Explain the RC5 method used for encryption and decryption(8)
(ii) Explain Triple DES and its applications.(8)
(i)Draw the general structure of DES and explain how encryption and decryption are
carried out.(12)
(ii) Mention the strength of DES algorithm.(4)
(i)How meet in Meet in middle attack is performed on double Data Encryption
Standard.(8)
(ii)Explain the substitution bytes transformation and add round key transformation of
AES cipher(8)
(i) Explain how encryption is done using advanced encryption standard with
necessary diagram(8)
(ii)Explain in detail about Blowfish .(8)
Users A and B use the Diffie- Hellman key exchange technique, a common prime
q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3.What is As public key YA?
(ii)If user B has private key XB=6. What is Bs public key YB?
(iii) What is the shared secret key? Also write the algorithm.
(i) Explain RSA Algorithm.(8)
(ii)Demonstrate the encryption and decryption for the RSA algorithm parameters.
P=3, Q=11, E=7, d=?, M=5. (8)
(i) Discuss how discrete logarithm evaluated for a number? What is the role of
discrete log in the Diffie-Hellman key exchange in exchanging the secret key among
two users?(8)
(ii)What are elliptic curves? And also summarize how the elliptic curves are useful
for Cryptography?(8)
(i)Briefly explain the idea behind Elliptic Curve Cryptosystem.(8)
(ii)Explain the key management of public key encryption in detail.(8)
Describe the mathematical foundations of RSA algorithm. Perform encryption
decryption for the following.
P=17, q=7, e=5, n=119, message=6. Use Extended Euclids algorithm to find the
private key.
(i) User A and B use Diffie-Hellman key exchange a common prime q=71 and a
primitive root a=7.
If user A has private key XA=5, What is As public key YA
If user A has private key XB=12, What is Bs public key YB and What is shared
secret key? (8)
(ii)Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6
with a modules of P=11. Determine all the points in E11 (1, 6). Start by calculation
the right hand side of the equation of all the values of n? (8)
(i)Explain briefly about Diffie-Hellman key exchange algorithm with its pros and
cons. (10)
(ii) What is public key cryptography and when is it preferred?(6)
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Remembering
BTL-1
Analyzing
BTL-4
Creating
BTL-6
Remembering
BTL-1
Remembering
BTL-1
Analyzing
BTL-4
Understandin
g
BTL-2
Evaluating
BTL-5
Understandin
g
BTL-2
Understandin
g
BTL-2
Remembering
BTL-1
Applying
BTL-2
Applying
BTL-3
Analyzing
BTL-4
Page 4 of 10
www.vidyarthiplus.com
UNIT III
PART-A
Q.No
Question
Competence
Level
Understanding
BTL-2
Remembering
BTL-1
Analyzing
BTL-4
Remembering
BTL-1
Creating
BTL-6
Remembering
BTL-1
Evaluating
BTL-5
Understanding
BTL-2
Remembering
BTL-1
10
Remembering
BTL-1
11
Understanding
BTL-2
12
Analyzing
BTL-4
13
Differentiate between message authentication code and one way hash function.
Evaluating
BTL-5
14
Applying
BTL-3
15
Understanding
BTL-2
16
Creating
BTL-6
17
Remembering
BTL-1
18
Analyzing
BTL-4
19
Applying
BTL-3
20
Applying
BTL-3
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 5 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6
(i)Where hash functions are used? What characteristics are needed in secure hash
function? write about the security of hash functions and MACs.(8)
(ii)Examine Digital signature with ElGamal public key cryptosystem.(8)
Describe digital signature algorithm and show how signing and verification is
done using DSS.
Explain the process of deriving eighty 64-bit words from 1024 bits for processing
Of a single blocks and also discuss single round function in SHA-512 algorithm.
Show the values of W16, W17, W18 and W19.
What is Digital Signature? Explain how it is created at the sender end and
retrieved at receiver end .differentiate digital signature from digital certificate.
(i)Describe HMAC algorithm in detail.(8)
(ii)Explain the classification of authtication function in detail.(8)
(i)Compare the features of SHA and MD5 algorithm(8)
(ii)Discuss about the objectives of HMAC and its security features(8)
Competence
Level
Remembering
BTL-1
Remembering
BTL-1
Evaluating
BTL-5
Understanding
BTL-2
Understanding
BTL-2
Creating
BTL-6
How MD5 method provide security to the system?Explain with suitable diagram.
Analyzing
BTL-4
Remembering
BTL-1
What is meant by message digest and explain about HMAC digital signatures
Remembering
BTL-1
10
Applying
BTL-3
11
Understanding
BTL-2
Applying
BTL-3
Analyzing
BTL-4
Analyzing
BTL-4
12
13
14
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 6 of 10
www.vidyarthiplus.com
UNIT IV
PART-A
Q.No Question
Competence
Level
Evaluating
BTL-5
Analyzing
BTL-4
Applying
BTL-3
Analyzing
BTL-4
Define Worm.
Remembering
BTL-1
Applying
BTL-3
Analyzing
BTL-4
What is intruder?
Applying
BTL-3
Remembering
BTL-1
10
Define: SET
Remembering
BTL-1
11
Understanding
BTL-2
12
Creating
BTL-6
13
Define firewall.
Remembering
BTL-1
14
Understanding
BTL-2
15
Understanding
BTL-2
16
Remembering
BTL-1
17
Remembering
BTL-1
18
Evaluating
BTL-5
19
What is the role of Ticket Granting Server in inter realm operations of Kerberos?
Creating
BTL-6
20
Understanding
BTL-2
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 7 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6
10
11
12
13
14
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Understanding
BTL-2
Analyzing
BTL-4
Evaluating
BTL-5
Remembering
BTL-1
Remembering
BTL-1
Understanding
BTL-2
Analyzing
BTL-4
Analyzing
BTL-4
Analyzing
BTL-4
Understanding
BTL-2
Applying
BTL-3
Remembering
BTL-1
Applying
BTL-3
Remembering
BTL-1
Page 8 of 10
www.vidyarthiplus.com
UNIT V
PART-A
Q.No Question
Competence
Level
Understanding
BTL-2
Understanding
BTL-2
Define S/MIME.
Remembering
BTL-1
Remembering
BTL-1
Analyzing
BTL-4
Remembering
BTL-1
Understanding
BTL-2
Analyzing
BTL-4
Remembering
BTL-1
10
Remembering
BTL-1
11
Understanding
BTL-2
12
Remembering
BTL-1
13
Creating
BTL-6
14
Applying
BTL-3
15
Understanding
BTL-2
16
How can the signed data entity of S/MIME be prepared? Write the steps
Applying
BTL-3
17
Evaluating
BTL-5
18
Remembering
BTL-1
19
Applying
BTL-3
20
Understanding
BTL-2
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 9 of 10
www.vidyarthiplus.com
PART-B
Q.No
1
3
4
5
6
7
8
10
11
12
13
14
Question
(i) How does PGP provide authentication and confidentiality for email services
and for file transfer applications? Draw the block diagram and explain the
components. (8)
(ii) Explain the general format of PGP message. (8)
(i) Summarize the Operations of PGP? Brief the various services provided by
PGP. (8)
(ii) Discuss the threats faced by an e-mail and explain its security requirements
to provide a secure e-mail service.(8)
(i) Describe about the PKI. (8)
(ii) Describe the ISAKMP format with diagrams.(8)
(i) Summarize about the authentication header of IP.
(8)
(ii) Discuss about encapsulating security payload of IP
(8)
(i) List the different protocols of SSL. Explain in detail Handshake protocol.(8)
(ii) Tell how does the server get authenticated to client in SSL?(8)
Explain IPSec protocols in detail .Also develop applications and advantages of
IPSec.
(i) What is the importance of web security? Explain how secure socket layer
provides the reliable service.(8)
(ii) Briefly explain about Transport Level Security.(8)
(i) Sketch and analyze the IPSec Document Overview diagram.
(8)
(ii) Draw and explain PGP Cryptographic function for Authentication.
(8)
(i) What is PGP? Examine how authentication and confidentiality is maintained
in PGP. (8)
(ii) Explain the key rings and its significance in PGP. Show how the message
generation from sender to receiver and explain with suitable diagram. (8)
(i) Draw the IP security authentication header and describe the functions of each
field. (8)
(ii) What is transport mode and tunnel mode authentication in IP? Describe how
ESP is applied to both these modes? (8)
(i) What do you mean by Security Association? Illustrate the parameters that
identify the Security Association. (8)
(ii) What is a dual signature and what is its purpose? With neat block diagram
illustrate the Secure Electronic Transaction.(8)
(i) Differentiate between transport modes vs. tunnel mode encryption in
IPsec.(8)
(ii) With a neat diagram, Describe handshake protocol in SSL.(8)
(i) Analyze the Cryptographic algorithms used in S/MIME. (8)
(ii) Explain S/MIME certification processing. (8)
(i) Describe importance of RADIX-64 conversion. (8)
(ii) Describe IP security Architecture. (8)
Verified by
: 1.
[
3.
[
Approved by HOD
Competence
Level
Evaluating
BTL-5
Understanding
BTL-2
Remembering
BTL-1
Understanding
BTL-2
Remembering
BTL-1
Creating
BTL-6
Remembering
BTL-4
Analyzing
BTL-4
Applying
BTL-3
Remembering
BTL-1
Applying
BTL-3
Understanding
BTL-2
Analyzing
BTL-4
Remembering
BTL-1
2.
[
4.
[
***************
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 10 of 10