0% found this document useful (0 votes)
63 views

What Are The Functions For Message Authentication?: What Is A Hash in Cryptography?

This document contains a question bank for the subject Cryptography and Network Security. It includes questions related to hash functions, message authentication codes, digital signatures, and algorithms like MD5, SHA, HMAC, DSS, Elgamal and Schnorr. The questions are divided into three parts - Part A contains short answer questions, Part B contains questions requiring explanations and diagrams, and Part C contains problems/examples to solve.

Uploaded by

harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

What Are The Functions For Message Authentication?: What Is A Hash in Cryptography?

This document contains a question bank for the subject Cryptography and Network Security. It includes questions related to hash functions, message authentication codes, digital signatures, and algorithms like MD5, SHA, HMAC, DSS, Elgamal and Schnorr. The questions are divided into three parts - Part A contains short answer questions, Part B contains questions requiring explanations and diagrams, and Part C contains problems/examples to solve.

Uploaded by

harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

MEENAKSHI SUNDARAJAN ENGINEERING COLLEGE, CHENNAI-24.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


QUESTION BANK

Subject Code / Subject Name:CS6701 / CRYPTOGRAPHY AND NETWORK SECURITY


Year / Sem: IV / VII

UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC –MD5 - SHA - HMAC – CMAC - Digital signature and authentication protocols –
DSS – EI Gamal – Schnorr.
C401.3 Understand the working and usage of hash functions and digital signatures
PART A
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. What are the functions for message authentication? BTL-1 Remember C401.3 PO1
2. Specify the requirements for message authentication? BTL-1 Remember C401.3 PO1
3. What is a message authentication code? BTL-1 Remember C401.3 PO1
4. How is security of MAC function expressed? BTL-2 Understand C401.3 PO1
5. What types of attacks are addressed by message BTL-2 Understand C401.3 PO1
authentication?
6. What two levels of functionality comprise a message BTL-2 Understand C401.3 PO1
authentication or digital signature mechanism?
7. What is a hash in cryptography? BTL-2 Understand C401.3 PO1
8. Differentiate Hash function and MAC? BTL-2 Understand C401.3 PO2
9. What is a message digest? BTL-1 Remember C401.3 PO1
10. What are the arithmetic and logical functions used in BTL-2 Understand C401.3 PO1
SHA?
11. What is SHA-2? BTL-1 Remember C401.3 PO1
12. What is the difference between little endian and big BTL-2 Understand C401.3 PO1
endian format?
13. List the characteristics of a good hash function. BTL-1 Remember C401.3 PO1
14. What is the one way property of hash function? BTL-1 Remember C401.3 PO1
15. What is the role of compression function in a hash BTL-2 Understand C401.3 PO2
function?
16. Define the term sponge construction? BTL-1 Remember C401.3 PO1
17. Define weak collision property and strong collision BTL-1 Remember C401.3 PO1
property of a hash function.
18. What is a digital signature? BTL-1 Remember C401.3 PO1
19. What are the properties of a digital signature? BTL-1 Remember C401.3 PO1
20. Differentiate direct and arbitrated Digital signature. BTL-2 Understand C401.3 PO2
21. In what order the signature function and the BTL-4 Analyze C401.3 PO2
confidentiality function be applied to a message,
and why?
22. Mention the significance of signature function used in BTL-2 Understand C401.3 PO1
Digital Signature Standard (DSS) approach.
23. How digital signature differs from authentication BTL-4 Analyze C401.3 PO2
protocols?
24. What are the threats associated with direct digital BTL-2 Understand C401.3 PO1
signature scheme?
25. List the various algorithms used in generating a digital BTL-1 Remember C401.3 PO1
signature.

26. What is DSS? BTL-1 Remember C401.3 PO1

PART B
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. Explain the various approaches of message BTL-4 Analyze C401.3 PO1,
authentication code with suitable diagrams. PO2
Why is it preferred to symmetric encryption?
2. What are the ways by which a hash code can provide BTL-2 Understand C401.3 PO1
message authentication? Explain each of them with
suitable diagrams.
3. Discuss the Message Digest-5 algorithm with suitable BTL-4 Analyze C401.3 PO1,
diagrams. Compare its performance with SHA-1. PO2
4. Discuss Secure Hash Algorithm with suitable diagrams. BTL-4 Analyze C401.3 PO1,
Compare its characteristics and variants? PO2
5. Discuss HMAC algorithm in detail with necessary BTL-2 Understand C401.3 PO1,
diagrams. PO2
6. Explain CMAC algorithm with suitable diagrams? BTL-2 Understand C401.3 PO1
7. Explain Digital signatures in detail with suitable BTL-2 Understand C401.3 PO1
diagrams.
8. Explain RSA algorithm for generating digital signature. BTL-4 Analyze C401.3 PO1,
How is it different from RSA encryption? PO2
9. Illustrate Digital Signature standard Algorithm with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
10. Illustrate Schnorr Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
11. Illustrate Elgamal Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
PART C
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. With a neat diagram, explain the steps involved in SHA BTL-3 Apply C401.3 PO3
algorithm for encrypting a message with the maximum
length of less than 2128 bits and produces as output a
512 bit message digest.
2. Compare SHA 1, SHA 256 and SHA 512 based on BTL-4 Analyze C401.3 PO2
various parameters and emphasizing on their
compression functions.
3. Explain the process of deriving eighty 64 bit words BTL-2 Understand C401.3 PO3
from the 1024 bits for processing of a single block and
also discuss single round function in SHA 512
algorithm. Show the values of W16, W17, W18, W19.
4. Alice chooses q=101 and p=7879. Alice selects h=3 BTL-5 Evaluate C401.3 PO4
and calculates g. Alice chooses x=75 as the private key
and calculates y. Now, Alice can send a message to
Bob. Assume that H(M)=22 and Alice choose secret
number k=50. Verify the signature.
5. Explain the following based on Digital Signature BTL-6 Create C401.3 PO6
Algorithm:
a. DSA specifies that if the signature generation process
results in a value of s = 0, a new value of k should be
generated and the signature should be recalculated.
Why?
b. What happens if a k value used in creating a DSA
signature is compromised?
6. Alice chooses prime p=19, a=10 and private key BTL-5 Evaluate C401.3 PO3
XA=16. Calculate public key. If H(M)=14 and K=5.
Compute the signature using Elgamal Digital signature
scheme and verify the same.

7. Compare the performance of RIPEMD-160 algorithm BTL-4 Analyze C401.3 PO2


and SHA-1.

You might also like