Вы находитесь на странице: 1из 3

University Questions

Department of IT
IT2352 CRYPTOGRAPHY AND NETWORK SECURITY
UNIT I
PART A
2014 May
2014 Nov

2013 May

2013 Nov
2012 May
2012 Nov

2011 May
2011 Nov

1
2
1

What are active and passive attacks that compromise information Secuirty?
Why random numbers are used in network security?
Decipher the following cipher text using brute force attack:

2
1

CMTMROOEOORW (Hint:Algorithm Railfence)


What are the two basic functions used in encryption algorithms?
Convert the given text anna university into cipher text using rail fence

2
1
2
1
2
1

technique.
Define steganography.
Give an example each for substitution and transposition ciphers.
Why modular arithmetic has been used in Cryptography?
Define LFSR sequence.
Define finite filed
What is the difference between a mono alphabetic and a poly alphabetic

2
1
2
1
2

cipher?
What is an avalanche effect?
Differentiate passive attack from active attack with example.
What is the use of Fermats theorem?
Give the types of attack.
List out the problems of one time pad?

PART-B

2014 May

1
2

2014 Nov

Explain any two classical ciphers and also describe their security limitations.
Describe Linear Feedback Shift Registers Sequence and Finite Fields with
their application in cryptography.
Encrypt the message PAY using Hill cipher with the following key matrix
and show the decryption to get the original plain text.

17 7 5
K= 21 18 21
2 2 19
2

2013 May

2013 Nov

2
1
2

2012 May
2012 Nov

2011 May
2011 Nov

1
2
1
2

1
2
1
2

Write short notes on:


(i)
Fermat and Eulers theorem(8)
(ii)
Chinese Remainder theorem(8)
Write about any two classical crypto Systems (Substitution and transposition)
with suitable examples.
Write about Fermat and Eulers theorem in detail.
(i)
What are the different types of attacks? Explain.(8)
(ii)
State and explain chinese remainder theorem with example.(8)
(i)
State Fermats theorem (4)
21
(ii)
Find 3
mod 11 using Fermats theorem (6)
(iii)
State Eulers theorem to find gcd with example (6)
Explain about Chinese remainder theorem
Explain Any Two Types of Cipher Technique in Detail.
Explain briefly about Fermats and Eulers theorems.
Explain the following with suitable examples.
(i)
Caesar cipher (2)
(ii)
Monoalphabetic cipher (2)
(iii)
Simple columnar transposition technique (6)
(iv)
Vernam cipher (6)
Discuss the classical cryptosystems and its types.
Describe Eulers and Chinese Remainder theorem.
Using play fair cipher algorithm encrypts the message using the key
"MONARCHY" and explain.
Explain the ceaser cipher and monoalphabetic cipher.

FREQUENTLY ASKED QUESTIONS


UNIT-I
PART-A
1
.

What are active and passive attacks that compromise information Secuirty?
(2014 May,2011 May)

PART-B
1.

2.
3.

Explain any two classical ciphers and also describe their security limitations (2014 May
(1),2014 Nov (1),2013 May(1),2012 May (2),2012 Nov (2),2011 May (1),2011 Nov
(1,2))
Write about Fermat and Eulers theorem in detail. (2014 Nov (2), 2013 May (2), 2013
Nov (2), 2012 Nov (1)).
Explain about Chinese remainder theorem (2014 Nov (2),2013 Nov (1),2011 May (2)

Вам также может понравиться