CNS Final Question Bank

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

QUESTION BANK

SUBJECT : Cryptography and Network Security


SEM / YEAR : VII Sem / IV Year
UNIT I -INTRODUCTION
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels,
Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security
architecture – Classical encryption techniques: substitution techniques, transposition techniques,
steganography).- Foundations of modern cryptography: perfect security – information theory – product
cryptosystem – cryptanalysis
PART – A
BT
Q.No Questions Level Competence
1. Differentiate symmetric and asymmetric encryption? BTL1 Remember
2. State Legal, Ethical and Professional Aspects of Security. BTL1 Remember
3. Give Need for Security at Multiple levels. BTL2 Understand
4. Specify Security Policies. BTL1 Remember
5. Identify the types of attack. BTL3 Apply
6. Define Model of network security. BTL1 Remember
7. Identify an example for substitution and transposition ciphers. BTL3 Apply
8. Explain network security. BTL2 Understand
9. Distinguish Encryption and Decryption. BTL4 Analyze
10. Define cryptography. BTL1 Remember
11. What are the 3 aspects of security? BTL3 Apply
12. Define security mechanisms. BTL1 Remember
Summarize the difference between Substitution and Transposition
13. BTL2 Understand
techniques.
Give the list of keys are required for two people to communicate via a
14. cipher. BTL2 Understand
15. Compare Block and Stream cipher. BTL4 Analyze
16. Discuss cryptanalysis and cryptography BTL6 Create
17. Define Steganography. BTL5 Evaluate
Decipher the following cipher Text using brute force attack:
18. BTL5 Evaluate
CMTMROOEOORW (Hint: Algorithm-Rail fence)
Convert the Given Text “VALLIAMMAI” into cipher text using Rail
19. fence Technique. BTL6 Create
20. Differentiate active attack and passive attack. BTL4 Analyze
PART – B
1. Describe the differences between steganography and cryptography with
BTL1 Remember
example in details. (13)
2. (i)Define Security trends - Legal, Ethical and Professional Aspects of
Security. (7)
BTL1 Remember
(ii) State about the Security at Multiple levels and explain Security
Policies. (6)
3. Describe:
(i) Playfair cipher (5) ii) Railfence cipher (4) iii)Vignere cipher (4) BTL1 Remember
(i) Describe the following
a) Message Integrity (2)
b) Denial of Service (2)
4. c) Availability (2) BTL1 Remember
d) Authentication (2)
(ii) List and briefly describe categories of passive and active security
attacks. (5)
i) Define Steganography? Describe various techniques used in
5. Steganography. (7) BTL2 Understand
ii)State mono-alphabetic cipher? How it is different from Caesar cipher (6)
(i) Discuss the substitution Techniques in detail. (7)
6. BTL2 Understand
(ii) Discuss the Transposition Techniques in detail. (6)
(i) Discuss the various security mechanisms. (7)
7. BTL2 Understand
(ii) Summarize OSI security architecture model with neat diagram. (6)
(i)Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, the message is
encrypted by Caesar cipher and k=5. Try to decrypt the message.
8. (7) BTL3 Apply
(ii) Using Vigenere cipher, encrypt the word “explanation” using the
Key leg. (6)
Encrypt the following using play fair cipher using the keyword
9. MONARCHY. Use X for blank spaces “SWARAJ IS MY BIRTH RIGHT” BTL3 Apply
(13)
Perform encryption and decryption using Hill Cipher for the following.
10 BTL4 Analyze
Message: PEN and Key: ACTIVATED (13)
(i) Classify and briefly define types of cryptanalytic attacks based on what is
11. known to the attacker. (7) BTL4 Analyze
(ii) Explain briefly the two general approaches to attacking a cipher. (6)
Explain the network security model and its important parameters with a neat
12. BTL4 Analyze
block diagram. (13)
Evaluate the Characteristics of Modern Cryptography and working
13. BTL5 Evaluate
Principle. (13)
Encrypt the message “PAY” using hill cipher with the following key matrix
and show the decryption to get original plain text. (13)
14. BTL6 Create

PART C

1. Illustrate the Classical Encryption Technique with an example (15) BTL6 Create
(i) Illustrate the rules to perform encryption using play fair cipher and
encrypt ‘snowshooos’ using ‘monarchy’ I and J count as one letter and
2. x is the filler letter. (8) BTL6 Create
(ii) Encrypt the word “Semester Result” with the keyword “Examination”
using playfair cipher. (7)
Encrypt the message “FINALYEAR” at the sender end and decrypt the
message at receiver end With using Hill-cipher with the key. (15)
3. BTL5 Evaluate

Compare transposition cipher and substitution cipher. Apply two stage


4. transpositions Cipher on the “treat diagrams as single units” using the BTL5 Evaluate
keyword “sequence”. (15)
UNIT II - SYMMETRIC CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic-
Euclid’s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields- SYMMETRIC KEY
CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear
cryptanalysis - Block cipher design principles – Block cipher mode of operation – Evaluation criteria for
AES – Advanced Encryption Standard - RC4 – Key distribution
PART – A
BT
Q.No Questions Competence
Level
1 Write the Euclidean Algorithm. BTL1 Remember
2 List the fundamental elements of abstract algebra or modern algebra BTL1 Remember
3 Why set of all Integers is not a field? BTL1 Remember
Assume that a = 255 and n = 11. We can find q = 23 and r = 2 using the
4 division algorithm we have learned in arithmetic. Calculate q and r for BTL3 Apply
a= -255 and n=11
5 Define Finite Group BTL1 Remember
6 Find gcd (1970, 1066) using Euclid’s algorithm. BTL3 Remember
7 What is the difference between a block cipher and a stream cipher? BTL2 Understand
8 State the five modes of operation of block cipher? BTL2 Understand
9 Explain the strength of triple DES. BTL2 Understand
10 Explain S-DES Structure. BTL2 Understand
11 What is triple encryption? How many keys are used in triple encryption? BTL1 Apply
12 Show general design of S-AES encryption cipher BTL1 Remember
13 Identify Data units used in AES. BTL3 Analyze
14 Find 117 mod 13. BTL4 Apply
15 Compare DES and AES. BTL4 Analyze
List the parameters (block size, key size and no. of rounds) for the three
16 BTL4 Analyze
AES versions.
17 Explain idea of RC4 stream cipher. BTL5 Evaluate
18 Explain Flat Multiple KDCs. BTL5 Evaluate
19 Discuss Key-Distribution Center. BTL6 Create
20 Explain Hierarchical Multiple KDCs. BTL6 Create
PART – B
1 Describe Modulo Arithmetic operations and properties in detail. (13) BTL1 Remember
(i) Describe in detail the key generation in AES algorithm and
2 its expansion format (7) BTL1 Remember
(ii) Describe Triple DES and its applications. (6)
3 Describe AES algorithm with all its round functions in detail. (13) BTL1 Remember
4 Describe DES algorithm with neat diagram and explain the steps. (13) BTL1 Remember
Solve gcd(98, 56) using Extended Euclidean algorithm. Write the
5 BTL2 Understand
algorithm also (13)
6 Discuss the following in detail
(i) Modular Exponentiation (7) BTL2 Understand
(ii) Finite fields (6)
7 Explain the DES and General structure of DES with diagrams. (13) BTL2 Understand
Identify the purpose of Differential and linear cryptanalysis and explain
8 BTL3 Apply
with neat diagram. (13)
For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function (4)
9 BTL3 Apply
ii) f function (3)
iii) Permutation p (3)
iv) Swapping of halves of the block. (3)
Explain the following modes of operation in block cipher.
10 (i) Electronic code book and Cipher block chaining. (7) BTL4 Analyze
(ii) Cipher feedback mode and output feedback mode. (6)
(i) How Meet in the middle attack is performed on double
Data encryption Standard? (7)
11 BTL4 Analyze
(ii) Explain the substitution bytes transformation and add round
key transformation of AES cipher. (6)
Discuss the properties that are to be satisfied by Groups, Rings and Fields.
12 (13) BTL4 Analyze
Explain about Block cipher design principles – Block cipher mode of
13 BTL5 Evaluate
operation. (13)
14 Discuss about Public Key distribution and Symmetric-Key Distribution.(13) BTL6 Create
PART C
What do you mean by AES? Diagrammatically illustrate the structure of
1. BTL6 Create
AES and describe the steps in AES encryption process with example. (15)
Discuss Structure of Simplified DES (S-DES) and Cipher and
2. Reverse Cipher. (15) BTL6 Create
i) Explain Key-distribution center with all aspects with neat diagram. (10)
3. ii) Find 1113 mod 53 using modular exponentiation (5) BTL5 Evaluate

4. Measure the Public key-distribution and Symmetric Key-Distribution. (15) BTL5 Evaluate

UNIT III - PUBLIC KEY CRYPTOGRAPHY


MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem –
Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution –
Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-
Elliptic curve cryptography.
PART – A
BT
Q.No Questions Competence
Level
1. Define Coprimes. BTL1 Remember
2. Define Euler’s theorem. BTL1 Remember
3. What is a primitive root of a number? BTL1 Remember
4. State Fundamental Theorem of Arithmetic. BTL1 Remember
5. Define Euler’s totient function. BTL1 Remember
6. State Fermat’s little theorem. BTL1 Remember
Assume n has 200 bits. Give the number of bit operations needed to run the
7. divisibility-test algorithm? BTL2 Understand
8. Why is asymmetric cryptography bad for huge data? Specify the reason. BTL2 Understand
9. Compare public key and private key. BTL2 Understand
10. Explain elliptic curve. BTL2 Understand
Explain whether symmetric and asymmetric cryptographic algorithm need
11. key exchange. BTL4 Analyze
12. Give the applications of the public key cryptosystem BTL3 Apply
Using the properties of discrete logarithms, show how to solve the
13. following congruence: x2 ≡ 36 (mod 77). BTL3 Apply

14. Illustrate the purpose of Diffie Hellman key exchange. BTL3 Apply
15. Explain Elliptic Curves over Real Numbers BTL4 Analyze
16. Explain attacks of RSA cryptosystem BTL4 Analyze
Perform encryption and decryption using RSA algorithm for the following.
17. p=7, q=11; e=17; m=8. BTL5 Evaluate
18. Prepare any one technique attacking in RSA. BTL5 Evaluate
Predict differences between Conventional Encryption and Public-Key
19. BTL6 Create
Encryption.
20. Are strong primes necessary in RSA? BTL6 Create

PART – B

i. Describe RSA algorithm (6)


1 ii. Pe BTL1 Remember
rform encryption and decryption using RSA algorithm for the
following: p=7 q=11, e=7, M=9. (7)
Prove the Following
(i). If p is a prime and a is a positive integer relatively prime to p, then
2 BTL1 Remember
ap-1≡ 1(mod p) (7)
p
(ii). If p is a prime and a is a positive integer, then a ≡ a (mod p). (6)
Prove the following
(i).If n and a are coprime, then aφ(n) ≡ 1 (mod n). (6)
3 (ii) Use Euler's Theorem to find a number a between 0 and 9 such that a is BTL1 Remember
congruent to71000 modulo 10. (Note that this is the same as the last digit of
the decimal expansion of 71000.) (7)
With a neat sketch explain the Elliptic curve cryptography with an example.
4 BTL1 Remember
(13)
Perform encryption and decryption using RSA algorithm for p=17,
5 BTL2 Understand
q=11,e=7 m=88. (13)
(i) Discuss how discrete logarithm evaluated for a number? What is the
role of discrete log in the Diffie - Hellman key exchange in exchanging
6 the secret key among two users? (7) BTL2 Understand
(ii)
What are elliptic curves? And also discuss how the elliptic curves are
useful for Cryptography? (6)
7 Explain the Key generation, encryption, and decryption in ElGamal. (13) BTL2 Understand
Find the secret key shared between user A and user B using Diffie-
8 Hellman algorithm for the following q=353; α (primitive root)=3, XA=45 BTL3 Apply
and XB=50 (13)
9 Experiment with Taxonomy of potential attacks on RSA. (13) BTL3 Apply
(i) Explain Chinese Remainder theorem and find X for the given set of
10 congruent equation using CRT (7) BTL4 Analyze
X ≡ 2 (mod 3) X ≡ 3 (mod 5) X ≡ 2 (mod 7)
(ii) State and Prove Fermat’s theorem. (6)
11 Examine Elliptic Curve Cryptography Simulating ElGamal. (13) BTL4 Analyze
Users A and B use the Diffie-Hellman key exchange technique, a
common prime q=11 and a primitive root alpha=7.
12 (i) If user A has private key XA=3.What is A’s public key YA? (5) BTL4 Analyze
(ii)If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Summarize Chinese Remainder theorem and find X for the given set of
13 congruent equation using CRT . (13) BTL5 Evaluate
X ≡ 1 (mod 5) X ≡ 2 (mod 7) X ≡ 3 (mod 9) X ≡ 4(mod 11)
(i) Discuss the Diffie-Hellman key exchange algorithm with its merits
14 and demerits. (7) BTL6 Apply
(i) Explain public key cryptography and when it is preferred. (6)
PART C
Users Alice and Bob use the Diffie-Hellman key exchange technique with
a common prime q = 83 and a primitive root α = 5.
1. i)If Alice has a private key XA = 6, what is Alice’s public key YA? (6) BTL6 Create
ii) If Bob has a private key XB = 10, what is Bob’s public key YB? (6)
iii) Co
nstruct the shared secret key (3)
State and prove the Chinese remainder theorem. What are the last two
2. BTL6 Create
digits of 4919? (15)
i) In a public-key system using RSA, you intercept the cipher text C = 10
sent to a user whose public key is e = 5, n = 35. What is the plaintext M? (8)
3. BTL5 Evaluate
ii) In an RSA system, the public key of a given user is e = 31, n = 3599.
Determine the private key of this user? (7)
4. Discuss the ElGamal cryptosystem and elliptic curve cryptosystem (15) BTL5 Evaluate

UNIT IV - MESSAGE AUTHENTICATION AND INTEGRITY


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication:
Biometrics, Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509
PART – A
BT
Q.No Questions Competence
Level
1. State any three requirements for authentication. BTL1 Remember
2. Point out the properties a digital signature. BTL4 Analyze
3. What is the role of compression function in hash function? BTL1 Remember
4. Define the term message digest. BTL1 Remember
5. Define the classes of message authentication function. BTL1 Remember
6. List the authentication message requirements. BTL1 Remember
7. How is the security of a MAC function expressed? BTL2 Understand
8. Identify the requirements for message authentication. BTL3 Apply
9. Give the two approaches of digital signature. BTL2 Understand
Explain the significance of signature function in Digital Signature
10. BTL2 Understand
Standard (DSS) approach.
11. Identify the security services provided by digital signature. BTL3 Apply
12. How digital signatures differ from authentication protocols? BTL2 Apply
13. How do you specify various types of authentication protocol? BTL1 Remember
14. Explain the purpose of X.509 standard. BTL4 Analyze
15. What is Kerberos? Point out its uses. BTL4 Analyze
16. Identify 4 requirements defined by Kerberos. BTL3 Understand
17. Summarize the Classes of message authentication function. BTL5 Evaluate
Assume a client C wants to communicate with a server S using Kerberos
18. BTL5 Evaluate
protocol. Explain How can it be achieved?
19. Create a simple authentication dialogue used in Kerberos. BTL6 Create
Design the role of Ticket Granting Server in inters realm operations of
20. BTL6 Create
Kerberos.
PART – B
(i)Where hash functions are used? What characteristics are needed in
secure hash function? Write about the security of hash functions and
1 BTL1 Remember
MACs. (7)
(ii)Discuss the classification of authentication function in detail. (6)
Describe digital signature algorithm and show how signing and
2 BTL1 Remember
Verification is done using DSS. (13)
3 Describe SHA2 in detail with neat diagram. (13) BTL1 Remember
What is Digital Signature? Explain how it is created at the sender end and
4 retrieved at receiver end .differentiate digital signature from digital BTL1 Remember
certificate. (13)
How Hash function algorithm is designed? Explain their features and
5 BTL2 Understand
properties. (13)
i) Explain in detail message authentication code and its requirements. (7)
6 ii)Illustrate the security of hash functions and MACs . (6) BTL2 Understand
7 Describe Challenge-Response protocols in detail. (13) BTL2 Understand
8 Explain the different approaches to message authentication (13) BTL5 Evaluate
Illustrate the steps involved in Signature generation and Verification
9 functions of DSS. (13) BTL3 Apply
10 Explain in detail about X.509 authentication services (13) BTL4 Analyze
Explain Client Server Mutual authentication with example flow
11 Analyze
diagram. (13) BTL4
i)What is Kerberos? Explain how it provides authenticated Services. (7)
12 BTL4 Analyze
ii)Explain the format of the X.509 certificate. (6)
Discuss the roles of the different servers in Kerberos protocol. How does
13 the user get authenticated to the different servers? (13) BTL6 Create
Explain briefly about the architecture and certification mechanisms in
14 BTL3 Apply
Kerberos and X.509. (13)
PART C
With a neat diagram, explain the steps involved in SHA algorithm for
1 encrypting a message with maximum length of less than 2128 bits and BTL5 Evaluate
produces as output a 512-bit message digest. (15)
Create the process of deriving eighty 64-bit words from 1024 bits for
2 processing Of a single blocks and also discuss single round function in BTL6 Evaluate
SHA-512 algorithm. Show the values of W16, W17, W18 and W19. (15)
(i) Enumerate the properties of Hash Function. (8)
3. (ii) Evaluate the authentication protocol and list its limitations, how the BTL5 Create
limitations overcome. (7)
(i)Elaborate the way how the limitations of Kerberos version 4 is overcome
4. in the environmental shortcomings and technical deficiencies. (8)
(ii) Elaborate how the encryption is key generated from password in BTL6 Create
Kerberos. (7)
UNIT V - SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders –
Malicious software – viruses – Firewalls
PART – A
BT
Q.No Questions Competence
Level
1. Define S/MIME. BTL1 Remember
2. Expand and define SPI. BTL1 Remember
3. Identify the steps involved in SET Transactions. BTL1 Remember
4. Define SET? What are the features of SET? BTL1 Remember
5. Identify the benefits of IPSecurity. BTL1 Remember
6. Identify the five header fields defined in MIME. BTL1 Remember
7. How can the signed data entity of S/MIME be prepared? Give the steps. BTL2 Understand
8. Differentiate transport and tunnel mode in IPsec. BTL2 Understand
9. Point out the services provided by PGP? BTL5 Evaluate
10. Explain the protocols used to provide IP security. BTL2 Understand
11. What is a virus in a computer? Classify the types of viruses. BTL3 Apply
12. What are the various types of firewall and its design goal? BTL3 Apply
13. Identify the three classes of Intruders. BTL3 Apply
14. What is a Threat? List their types. BTL4 Analyze
15. State the difference between threats and attacks. BTL4 Analyze
16. Differentiate spyware and virus. BTL4 Analyze
17. Give the advantages of intrusion detection system over firewall. BTL2 Understand
18. Show the design goals of firewalls. BTL6 Evaluate
19. Discriminate statistical anomaly detection and rule based detection BTL5 Create
20. Does the firewall ensure 100% security to the system? Comment. BTL6 Create
PART-B
1 Describe the working of SET with neat diagram. (13) BTL1 Remember
2 Describe in detail about SSL/TLS. (13) BTL1 Remember
Explain the architecture of IPsec in detail in detail with a neat block
3 BTL2 Understand
diagram. (13)
4 Describe in detail about S/MIME. (13) BTL1 Remember
Discuss authentication header and ESP in detail with their packet format.
5 (13) BTL2 Understand
Describe PGP cryptographic functions in detail with suitable block
6 BTL1 Remember
diagrams. (13)
(i) Discuss transport mode and tunnel mode authentication in IP? Describe
how ESP is applied to both these modes. (7)
7 BTL2 Understand
(ii)Draw the IP security authentication header and describe the functions
of each field. (6)
8 Explain the operational description of PGP. (13) BTL4 Create
Illustrate the working principle of SET relate EST for Ecommerce
9 BTL3 Apply
applications. (13)
Explain how firewalls help in the establishing a security framework for an
10 organization. (13) BTL4 Analyze
(i) Generalize the role of intrusion detection system? Point out the three
benefits that can be provided by the intrusion detection system? (7)
11 BTL6 Analyze
(ii) Prepare comparison details between statistical anomaly detection and
rule based intrusion detection system? (6)
Explain the different types of virus in detail. Suggest scenarios for
12 BTL4 Analyze
deploying these types in network scenario. (13)
Explain intrusion detection system (IDS) in detail with suitable diagrams.
13 BTL5 Evaluate
(13)
14 Illustrate the various types of firewalls with neat diagrams. (13) BTL3 Apply
PART C
1. Evaluate the performance of PGP. Compare it with S/MIME. (15) BTL5 Create
(i) Write the steps involved in the simplified form of the SSL / TLS
protocol. (8)
2. BTL6 Create
(ii)Generalize the methodology involved in computing the keys in SSL /
TLS protocol. (7)
(i) Explain the various measures that may be used for intrusion detection.
(8)
3. BTL5 Evaluate
(ii) Explain the various roles of firewalls and related terminology in detail.
(7)
Elaborate how secure electronic transaction (SET) protocol enables e-
4. transactions. Explain the components involved. (15) BTL6 Evaluate

You might also like