Академический Документы
Профессиональный Документы
Культура Документы
QUESTION BANK
UNIT-I
Part-A
1. Define the terms: Cryptography,cryptanalysis,cryptology.
2. Mention the three security goals.
3. List the types of attacks threatening ‘Confidentiality’.
4. List the types of attacks threatening ‘Integrity’.
5. List the types of attacks threatening ‘Availability’
6. Compare Passive and Active Attacks,
7. Name some Passive Attacks
8. Name some Active Attacks.
9. Mention the services related to security goals and attacks provided by X.800.
10. List the various security mechanisms provided by X.800.
11. Define traffic padding.
12. What do you mean by notarization?
13. What do you mean by repudiation?
14. What is masquerading?
15. Define DoS attack.
16. Mention the two mechanisms for implementing the security goals.
17. Mention the three distinct mechanisms of cryptography.
18. Compare symmetric key encipherment and asymmetric key encipherment.
19. What is steganography?
20. Compare cryptography and steganography.
21. What type of security mechanism(s) are provided when a person signs a form he has
filled out to apply for a credit card?
Part-B
1. Explain in detail about various types of attacks.
2. Explain in detail about various services provided by X.800.
3. Explain in detail about various Mechanisms provided by X.800.
4. Write short notes on
a. Cryptography
b. Steganography
UNIT-II
Part-A
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK
8. What is the relationship between the symbol in the plain text and symbol in the cipher
text in monoalphabetic substitution cipher?
12. Name the cipher which combines additive and multiplicative cipher?
15. Mention the three rules used for encryption in Play fair scheme.
19. Encrypt the message “this is an exercise”using one of the following ciphers. Decrypt the
message to get the original plain text.
20. Encrypt the message “the house is being sold tonight” using one the following ciphers.
Decrypt the message to get the plain text:
21. Use vigenere cipher with keyword “HEALTH” to encipher the message “Life is full of
surprises”.
22. Use hill cipher to encipher the message: “We live in an insecure world”. Use the
following key:
03 02
05 07
28. The encryption key in a transposition cipher is(3,2,6,1,5,4). Find the decryption key.
29. Use a brute force attack to decipher the following message enciphered by alice using an
additive cipher. Suppose that alice always uses a key that is close to her birthday which is
NCJAEZRCLASJLYODEPRLYZRCLASJLCPEHZDTOPDZQLNZTY.
36. Define a product cipher and list the two classes of product cipher.
39. compare differential and linear cryptanalysis. Which one is a chosen plain text attack?
41. Define a feedback shift register and mention its two types.
1 1 2 3 4 4
1 3 5 6 7
44. Show an LFSR with the polynomial x5+x2+1. What is the period?
47. What is double DES? What kind of attack on double DES makes it useless?
49. what is the block size in DES? What is the cipher key size in DES? What is the round key size
in DES?
51. List the parameters(block size,key size and the no of rounds) for the three versions of AES.
52. How many transformations are there in each version of AES? How many round keys are
needed for each version.
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK
53. Compare DES and AES. Which one is bit oriented? Which one is byte oriented?
55. List the modes of operation that need padding and that do not need padding.
56. List the modes of operation that use encryption and decryption functions and that use
encryptions only.
Part-B
1. Explain in detail about various cryptanalysis attacks.
UNIT-III
PART-A
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK
7. Find the multiplicative inverse of 8 using fermat’s theorem and euler’s theorem?
9. Verify whether the number 561 is a prime or composite using miller-rabin’s test?
13. What is the formula for finding the no of primitive roots for a given no?
a. 515 mod 13
b. 1518 mod 17
17. Determine whether following integers pass the fermat primality test:
18. Determine whether following integers pass the miller-rabin primality test:
19. Use a=2,x=3 and a few primes to show that if p is a prime, the following congruence
(x-a)pΞ(xp-a) (mod p) holds.
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK
Part-B
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK
1. A group of people are arranging themselves for a parade. If they line up three to a row,
one person is left over. If they line up four to a row, two people are left over, and if they
line up five to a row, three people are left over. What is the smallest possible number of
people?
2. Find the value of x using CRT:
a. xΞ2 mod 7 and xΞ3 mod 9
b. xΞ4 mod 5 and xΞ10 mod 11
c. xΞ7 mod 3 and xΞ11 mod 12
3. Explain the RSA algorithm. Perform the encryption and decryption using the algorithm for the
data given below
p=11 q= 13 e=11 P=7 (Show the calculations)
4. Explain the RSA algorithm. Perform the encryption and decryption using the RSA algorithm for
the following:
a. p=11; q=13; e=11; P=7;
b. p=17; q=31; e=7; P=2;
5. Write an algorithm for Miller-Rabin Primality Test? Verify the same with an example.
6. Write an algorithm for CRT.
7. Write an algorithm for RSA.
8. Write an algorithm for Rabin Cryptosystem. Verify the algorithm with p=23,q=7.
9. Write an algorithm for Elagamal Cryptosystem.
10. Write an algorithm for Elliptic Curve Cryptography.
11. Write an algorithm for Fermat Primality Test.
Unit-IV
Part-A
1. Distinguish between integrity and authentication.
14. In PGP, explain how Bob and Alice exchange the secret key for encrypting the messages.
15. In S/MIME, explain how Bob and Alice exchange the secret key for encrypting the
messages.
19. Explain the man in the middle attack in Diffie Hellman Key Exhange.
Part-B
CRYPTOGRAPHY AND SECURTIY
QUESTION BANK