Вы находитесь на странице: 1из 10

CRYPTOGRAPHY AND SECURTIY

QUESTION BANK

UNIT-I

Part-A
1. Define the terms: Cryptography,cryptanalysis,cryptology.
2. Mention the three security goals.
3. List the types of attacks threatening ‘Confidentiality’.
4. List the types of attacks threatening ‘Integrity’.
5. List the types of attacks threatening ‘Availability’
6. Compare Passive and Active Attacks,
7. Name some Passive Attacks
8. Name some Active Attacks.
9. Mention the services related to security goals and attacks provided by X.800.
10. List the various security mechanisms provided by X.800.
11. Define traffic padding.
12. What do you mean by notarization?
13. What do you mean by repudiation?
14. What is masquerading?
15. Define DoS attack.
16. Mention the two mechanisms for implementing the security goals.
17. Mention the three distinct mechanisms of cryptography.
18. Compare symmetric key encipherment and asymmetric key encipherment.
19. What is steganography?
20. Compare cryptography and steganography.
21. What type of security mechanism(s) are provided when a person signs a form he has
filled out to apply for a credit card?

Part-B
1. Explain in detail about various types of attacks.
2. Explain in detail about various services provided by X.800.
3. Explain in detail about various Mechanisms provided by X.800.
4. Write short notes on
a. Cryptography
b. Steganography

UNIT-II

Part-A
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

1. Draw the Symmetric Cipher Model.

2. What is the minimum number of keys required to communicate in a network?

3. State Kerchoff’s Principle.

4. Mention the various cryptanalysis attacks.

5. Mention the three methods used in cipher-text only attack.

6. Mention the two broad categories of traditional ciphers.

7. Compare substitution cipher and Transposition cipher.

8. What is the relationship between the symbol in the plain text and symbol in the cipher
text in monoalphabetic substitution cipher?

9. Which cipher is otherwise known as additive or shift cipher?

10. What is the key domain of additive cipher?

11. What is the key domain of multiplicative cipher?

12. Name the cipher which combines additive and multiplicative cipher?

13. Decrypt “XCZZU” using multiplicative cipher

14. Compare monoalphabetic substitution cipher and polyalphabetic substitution cipher.

15. Mention the three rules used for encryption in Play fair scheme.

16. List three monoalphabetic ciphers.

17. List three polyalphabetic ciphers.

18. List two transposition ciphers.

19. Encrypt the message “this is an exercise”using one of the following ciphers. Decrypt the
message to get the original plain text.

a. Addditive cipher with key=20

b. Multiplicative cipher with key=15

c. Affine cipher with key=(15,20)


CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

20. Encrypt the message “the house is being sold tonight” using one the following ciphers.
Decrypt the message to get the plain text:

a. Vigenere cipher with key: “dollars”

b. Autokey cipher with key=7

c. Play fair cipher key with the key word “secure”

21. Use vigenere cipher with keyword “HEALTH” to encipher the message “Life is full of
surprises”.

22. Use hill cipher to encipher the message: “We live in an insecure world”. Use the
following key:

03 02

05 07

23. Define one time pad cipher.

24. What is the idea behind rotor cipher?

25. List the main components of Enigma Machine.

26. Decrypt “MEMATEAKETETHPR” using rail fence technique.

27. Compare stream ciphers and block ciphers.

28. The encryption key in a transposition cipher is(3,2,6,1,5,4). Find the decryption key.

29. Use a brute force attack to decipher the following message enciphered by alice using an

additive cipher. Suppose that alice always uses a key that is close to her birthday which is

on the 13th of the month:

NCJAEZRCLASJLYODEPRLYZRCLASJLCPEHZDTOPDZQLNZTY.

30. Draw the block diagram of modern block cipher.

31. Why modern block ciphers need to be designed as a substitution cipher?

32. List the various components of modern block cipher.


CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

33. what is the key size in transposition and substitution ciphers.

34. Mention the three types of p boxes.

35. What is the necessary condition of an S-Box to be invertible?

36. Define a product cipher and list the two classes of product cipher.

37. Compare confusion and diffusion.

38. compare fiestel and a non-fiestel block cipher.

39. compare differential and linear cryptanalysis. Which one is a chosen plain text attack?

Which one is a known plain text attack?

40. Distinguish between a synchronous and a nonsynchronous stream cipher.

41. Define a feedback shift register and mention its two types.

42. what kind of P-box is the following:

1 1 2 3 4 4

43. What kind of P-box is the following:

1 3 5 6 7

44. Show an LFSR with the polynomial x5+x2+1. What is the period?

45. Draw the structure of fiestel block cipher.

46. What is the no of rounds in DES?

47. What is double DES? What kind of attack on double DES makes it useless?

48. What is triple DES? Mention its two variations.

49. what is the block size in DES? What is the cipher key size in DES? What is the round key size

in DES?

50. List the criteria defined by NIST for AES.

51. List the parameters(block size,key size and the no of rounds) for the three versions of AES.

52. How many transformations are there in each version of AES? How many round keys are
needed for each version.
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

53. Compare DES and AES. Which one is bit oriented? Which one is byte oriented?

54. List the five modes of operation.

55. List the modes of operation that need padding and that do not need padding.

56. List the modes of operation that use encryption and decryption functions and that use
encryptions only.

Part-B
1. Explain in detail about various cryptanalysis attacks.

2. Practice Problems under substitution ciphers and transposition ciphers.

3. Discuss in detail about various components of block cipher.

4. Write Short notes on Fiestel block structure.

5. Explain about LFSR.

6. Explain in detail: DES algorithm.

7. Explain in detail about AES.

8. Discuss various block cipher modes of operation in detail.

UNIT-III
PART-A
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

1. Define Euler-phi function or Euler-totient function.

2. What is the formula for ф(pn)?

3. What is the value of ф(240)?

4. State Fermat’s Theorem.

5. State Euler’s Theorem.

6. Find the result of 624mod 35?

7. Find the multiplicative inverse of 8 using fermat’s theorem and euler’s theorem?

8. Mention the two broad categories of primality testing.

9. Verify whether the number 561 is a prime or composite using miller-rabin’s test?

10. Mention the various factorization methods.

11. State CRT.

12. What is primitive root?

13. What is the formula for finding the no of primitive roots for a given no?

14. What is discrete logarithm?

15. Find the results of the following using fermat’s theorem:

a. 515 mod 13

b. 1518 mod 17

16. Find the value of ф29), ф(32), ф(100), ф(101)

17. Determine whether following integers pass the fermat primality test:

110,130,150. Use base 2.

18. Determine whether following integers pass the miller-rabin primality test:

110,130,150. Use base 2.

19. Use a=2,x=3 and a few primes to show that if p is a prime, the following congruence
(x-a)pΞ(xp-a) (mod p) holds.
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

20. When two numbers are said to be relatively prime?

21. Find the number of primitive roots of 21?

22. What is trapdoor one-way function?

23. What are Mersenne primes?

24. What are fermat primes?

25. Compare Prime and Composite Integer.

26. In RSA, Given n=221 and e=5. Find d.

27. In RSA, Given p=19,q=23 and e=3, find n, ф(n) and d.

Part-B
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

1. A group of people are arranging themselves for a parade. If they line up three to a row,
one person is left over. If they line up four to a row, two people are left over, and if they
line up five to a row, three people are left over. What is the smallest possible number of
people?
2. Find the value of x using CRT:
a. xΞ2 mod 7 and xΞ3 mod 9
b. xΞ4 mod 5 and xΞ10 mod 11
c. xΞ7 mod 3 and xΞ11 mod 12

3. Explain the RSA algorithm. Perform the encryption and decryption using the algorithm for the
data given below
p=11 q= 13 e=11 P=7 (Show the calculations)

4. Explain the RSA algorithm. Perform the encryption and decryption using the RSA algorithm for
the following:
a. p=11; q=13; e=11; P=7;
b. p=17; q=31; e=7; P=2;
5. Write an algorithm for Miller-Rabin Primality Test? Verify the same with an example.
6. Write an algorithm for CRT.
7. Write an algorithm for RSA.
8. Write an algorithm for Rabin Cryptosystem. Verify the algorithm with p=23,q=7.
9. Write an algorithm for Elagamal Cryptosystem.
10. Write an algorithm for Elliptic Curve Cryptography.
11. Write an algorithm for Fermat Primality Test.

Unit-IV

Part-A
1. Distinguish between integrity and authentication.

2. List three criteria a cryptographic function must satisfy.


CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

3. Distinguish between MDC and MAC.

4. Describe the idea of the Merkle-Damgard scheme.

5. Show the message digest creation of SHA-512.

6. Compare and contrast a conventional signature and digital signature.

7. List the security services provided by a digital signature.

8. Compare and contrast existential and selective forgery.

9. List the various schemes of digital signature.

10. Mention the various ways of distributing public keys.

11. Define Kerberos and name its servers.

12. Briefly explain the duties of each server in Kerberos.

13. List the duties of KDC.

14. In PGP, explain how Bob and Alice exchange the secret key for encrypting the messages.

15. In S/MIME, explain how Bob and Alice exchange the secret key for encrypting the
messages.

16. Mention the seven types of packets used in PGP.

17. Mention the three types of messages in PGP.

18. Compare and Contrast key management in PGP and S/MIME.

19. Explain the man in the middle attack in Diffie Hellman Key Exhange.

Part-B
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK

1. Explain in detail about SHA-512 operation and its round function.


2. Explain in detail about Kerberos and its servers .
3. Explain in detail about MDC and MAC.
4. State the D-H key exchange algorithm. Users A and B exchange technique with a common prime
p=19 and a primitive root g=13. Show that 13 is a primitive root of 19. If user A has public key R1
=3. What is A’s private key x? If user B has public key R2 =9, What is B’s private key y? What is
the shared secret key k?
5. Explain Diffie-Hellman key exchange algorithm. Users A and B use the Diffie-Hellman key
exchange technique with a common prime q=71 and primitive root g=7. If user A has private key
x=5, what is A’s Public Key R1? If user B has private key y=12, what is B’s public key R2? What is
the shared secret key?
6. Explain in detail about various schemes of digital signature.
7. Explain in detail about KDC.
8. Explain the different ways of public key distribution in detail.
9. Explain in detail about PGP
10. Explain in detail about S/MIME.
11. Write short notes on Fixed Password and One Time Password.

Вам также может понравиться