2 Mark Questions Answers PDF
2 Mark Questions Answers PDF
2
MARK QUESTIONS & ANSWERS
REGULATION: 2013
2018 - 2019
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
2 Mark Questions & Answers
UNIT-I INTRODUCTION & NUMBER THEORY
6. Find the GCD of 2740 and 1760, using Euclidean algorithm. (N/D-08)
The GCD of two numbers say a and b can be found using the following formula
gcd(a,b) =gcd(b,a mod b)
GCD(2740,1760) = gcd(1760, 2740 mod 1760)= gcd(1760,980)=980
5. What are the requirements for the use of a public-key certificate scheme?
(M/J-09)
Four requirements can be placed on this particular scheme:
1. Any participant can read a certificate to determine the name and public key
of the certificate’s owner
2. Any participant can read a certificate to determine the name and public key
of the certificate’s owner
3. Only the certificate authority can create and update certificates
4. Any participant can verify the currency of the certificate
10. What are two levels of functionality that comprise a message authentication or digital
signature mechanism?
At the lower level, there must be some sort of function that produces an authenticator: a
value to be used to authenticate a message. This lower-level function is then used as primitive in
a higher-level authentication protocol that enables a receiver to verify the authenticity of a
message.
12. What is the difference between a message authentication code and a one-way hash
function? (N/D-09)
A hash function, by itself, does not provide message authentication. A secret key must
be used in some fashion with the hash function to produce authentication. A MAC, by
definition, uses a secret key to calculate a code used for authentication.
UNIT-IV SECURITY PRACTICE & SYSTEM SECURITY
1 .Why does PGP generate a signature before applying compression? (A/M-11)
The signature is generated before compression due to 2 reasons:
It is preferable to sign an uncompressed message so that one can store only the
uncompressed message together with the signature for future.
6. What is the difference between an SSL connection and SSL session? (M/J-09)
Connection is a transport that provides a suitable type of service. For SSL, such
connections are peer-topeer relationships. The connections are transient. Every connection is
associated with one session. Session: An SSL session is an association between a client and a
server. Sessions are created by the Handshake Protocol. Sessions define a set of cryptographic
security parameters, which can be shared among multiple connections. Sessions are used to
avoid the expensive negotiation of new security parameters for each connection.
7. Why does ESP include a padding field? (N/D-08)
The ciphertext needs to end on an eight octet boundary because the Authentication data
field is properly aligned in the packet. This is what the protocol expects and if it doesn't follow
the rules, it's considered to contain an error in the packet. It's like English or other languages.
We expect sentences to end with a period so we know where one sentence ends and the other
begins.