CS8792-Cryptography and Network Security
CS8792-Cryptography and Network Security
com
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203
QUESTION BANK
VII SEMESTER
Regulation – 2017
Prepared by
PART C
1. Illustrate the Classical Encryption Technique with an example (15) BTL6 Creating
(i) Illustrate the rules to perform encryption using play fair cipher and
encrypt ‘snowshooos’ using ‘monarchy’ I and J count as one letter and
2. x is the filler letter. (8) BTL6 Creating
(ii) Encrypt the word “Semester Result” with the keyword “Examination”
using playfair cipher. (7)
Encrypt the message “FINALYEAR” at the sender end and decrypt the
message at receiver end With using Hill-cipher with the key. (15)
3. BTL5 Evaluating
11 What is triple encryption? How many keys are used in triple encryption? BTL1 Applying
12 Show general design of S-AES encryption cipher BTL1 Remembering
13 Identify Data units used in AES. BTL3 Analyzing
7
14 Find 11 mod 13. BTL4 Applying
15 Compare DES and AES. BTL4 Analyzing
List the parameters (block size, key size and no. of rounds) for the three
16 BTL4 Analyzing
AES versions.
17 Explain idea of RC4 stream cipher. BTL5 Evaluating
18 Explain Flat Multiple KDCs. BTL5 Evaluating
19 Discuss Key-Distribution Center. BTL6 Creating
20 Explain Hierarchical Multiple KDCs. BTL6 Creating
PART – B
1 Describe Modulo Arithmetic operations and properties in detail. (13) BTL1 Remembering
(i) Describe in detail the key generation in AES algorithm and its
2 expansion format (7) BTL1 Remembering
(ii) Describe Triple DES and its applications. (6)
3 Describe AES algorithm with all its round functions in detail. (13) BTL1 Remembering
4 Describe DES algorithm with neat diagram and explain the steps. (13) BTL1 Remembering
Solve gcd(98, 56) using Extended Euclidean algorithm. Write the
5 BTL2 Understanding
algorithm also (13)
6 Discuss the following in detail
(i) Modular Exponentiation (7) BTL2 Understanding
(ii) Finite fields (6)
Download updated materials from Rejinpaul Network App
www.rejinpaul.com
7 Explain the DES and General structure of DES with diagrams. (13) BTL2 Understanding
Identify the purpose of Differential and linear cryptanalysis and explain
8 BTL3 Applying
with neat diagram. (13)
For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function (4)
9 BTL3 Applying
ii) f function (3)
iii) Permutation p (3)
iv) Swapping of halves of the block. (3)
Explain the following modes of operation in block cipher.
10 (i) Electronic code book and Cipher block chaining. (7) BTL4 Analyzing
(ii) Cipher feedback mode and output feedback mode. (6)
(i) How Meet in the middle attack is performed on double Data
encryption Standard? (7)
11 BTL4 Analyzing
(ii) Explain the substitution bytes transformation and add round key
transformation of AES cipher. (6)
Discuss the properties that are to be satisfied by Groups, Rings and Fields.
12 BTL4 Analyzing
(13)
Explain about Block cipher design principles – Block cipher mode of
13 BTL5 Evaluating
operation. (13)
14 Discuss about Public Key distribution and Symmetric-Key Distribution.(13) BTL6 Creating
PART C
What do you mean by AES? Diagrammatically illustrate the structure of
1. BTL6 Creating
AES and describe the steps in AES encryption process with example. (15)
Discuss Structure of Simplified DES (S-DES) and Cipher and
2. BTL6 Creating
Reverse Cipher. (15)
i) Explain Key-distribution center with all aspects with neat diagram. (10)
3. BTL5 Evaluating
ii) Find 1113 mod 53 using modular exponentiation (5)
4. Measure the Public key-distribution and Symmetric Key-Distribution.(15) BTL5 Evaluating
PART – B