CS6701-Cryptography and Network Security
CS6701-Cryptography and Network Security
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
VII SEMESTER
Regulation – 2013
Prepared by
STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.
QUESTION BANK
SUBJECT : CS6701- Cryptography and Network Security
SEM / YEAR: VII/IV
16 Assess the following cipher text using brute force attack: Evaluate BTL-5
CMTMROOEOORW (Hint: Algorithm-Rail fence).
17 Generalize why network need security. Create BTL-6
18 Give examples for transposition cipher. Understand BTL-2
Show how to convert the given text “VALLIAMMAI” into
19 Apply BTL-3
cipher text using Rail fence Technique.
20 Plan how many keys are required by two people to communicate Create BTL-6
via a cipher.
PART - B
State and Describe
1 (i) Fermat’s theorem. (8) Remember BTL-1
(ii) Euler’s theorem. (5)
(i) Tabulate the substitution Techniques in detail. (5)
2 Remember BTL-1
(ii) Describe the Transposition Techniques in detail. (8)
STUDENTSFOCUS.COM
(i) List the different types of attacks and explain in
3 detail.(6) Remember BTL-1
(ii) Describe in detail about the types of cryptanalytic
attack. (7)
(i) Evalute321 mod 11 using Fermat’s theorem. (7)
(ii) State Chinese Remainder theorem and find X for the given
set of congruent equations using CRT. (6)
4 X=2(mod 3) Evaluate BTL-5
X=3(mod 5)
X=2(mod 7)
STUDENTSFOCUS.COM
(i) Discuss the following
a) Message Integrity (1)
14 b) Denial of Service (1) Understand BTL-2
c) Availability (1)
d) Authentication (1)
(ii) Estimate 1113 mod 53 using modular exponentiation. (9)
PART - C
Example: l = 5,
2 Create BTL-6
Keyword = A P P L E
Key = 1 4 5 3 2
Plaintext = T H I S I
S A C O L
U M N A R
T R A N S
P O S I T
I O N
STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.
QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV
STUDENTSFOCUS.COM
(i) Formulate the single round of DES algorithm. (7)
3 Create BTL-6
(ii)Design the key generation process of DES. (6)
(i) Describe the RC5 method used for encryption and
4 decryption. (6). Remember BTL-1
(ii)Describe Triple DES and its applications.(7)
(i) Draw the general structure of DES and describe how
5 encryption and decryption are carried out.(6) Remember BTL-1
(ii) Identify the strength of DES algorithm.(7)
(i) Analyze how men in middle attack is performed
on double Data Encryption Standard.(7)
6 Analyse BTL-4
(ii) Explain the substitution bytes transformation and
add round key transformation of AES cipher. (6)
(i) How AES is used for encryption/Decryption?
7 Discuss with example. (7) Understand BTL-2
(ii) Discuss in detail about Blowfish. (6)
Evaluate using Diffie-Hellman key exchange technique.
Users A and B use a common prime q=11 and a
primitive root alpha=7. (13)
(i) If user A has private key XA=3.What is A’s public key
8 YA? Evaluate BTL-5
(ii)If user B has private key XB=6. What is B’s public key
YB?
(iii) What is the shared secret key? Also write the algorithm.
(i) Describe RSA Algorithm.(7)
9 (ii)Estimate the encryption and decryption values for the Understand BTL-2
RSA algorithm parameters. P=7, Q=11, E=17, M=8. (6)
(i) Summarize the role of discrete log in the Diffie-Hellman
key exchange in exchanging the secret key among two
10 users.(6) Understand BTL-2
(ii) What are elliptic curves? Describe how the elliptic curves
are useful for Cryptography?(7)
Describe the key management of public key encryption in
11 Remember BTL-1
detail.(13)
Apply the mathematical foundations of RSA algorithm.
Perform encryption decryption for the following data. P=17,
12 Apply BTL-3
q=7, e=5, n=119, message=”6”. Use Extended Euclid’s
algorithm to find the private key.(13)
(i) User A and B use Diffie-Hellman key exchange a
common prime q=71 and a primitive root a=7.Calculate
the following. If user A has private key XA=5, what is
A’s public key YA. If user A has private key XB=12,
what is B’s public key YB and what is shared secret key?
13 Apply BTL-3
(7)
(ii) Consider the elliptic curve E11 (1, 6); that is the curve is
defined by y2=x3+x+6 with a modules of P=11. Calculate
all the points in E11 (1, 6). Start by calculation the right
hand side of the equation of all the values of n? (6)
(i) Explain briefly about Diffie-Hellman key exchange
14 algorithm with its pros and cons. (6) Analyse BTL-4
(ii) Explain public key cryptography and when is it preferred.
(7)
STUDENTSFOCUS.COM
PART - C
Input:
10100101
1 Create BTL-6
Key:
0 0 1 0 0 1 0 1 1 1
STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.
QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV
STUDENTSFOCUS.COM
(i) Explain the process of deriving eighty 64-bit words from
1024 bits for processing of a single blocks and also discuss
3 single round function in SHA-512 algorithm. (7) Evaluate BTL-5
(ii)Conclude the values of W16, W17, W18 and W19in the
above question (6)
(i) What is Digital Signature? Explain how it is created at the
4 sender end and retrieved at receiver end. (6) Understand BTL-2
(ii) Differentiate digital signature from digital certificate. (7)
(i)Describe HMAC algorithm in detail. (7)
5 (ii)Explain the classification of authentication function in Understand BTL-2
detail. (6)
(i)Compare the features of SHA and MD5 algorithm(7)
6 (ii)Discuss about the objectives of HMAC and its security Create BTL-6
features. (6)
Describe the MD5 message digest algorithm with necessary
7 Analyse BTL-4
block diagrams. (13)
(i)Illustrate simple hash function and birthday attack. (7)
8 Apply BTL-3
(ii) Compare HMAC and CMAC. (6)
Explain in detail ElGamal Public key cryptosystems with an
9 Remember BTL-1
example. (13)
10 Describe Secure hash Algorithm in detail. (13) Remember BTL-1
11 Summarize CMAC algorithm and its usage.(13) Understand BTL-2
12 Discuss about Authentication protocols. (13) Understand BTL-2
Explain in detail
13 (i) message authentication code(6) and Understand BTL-2
(ii) the requirements of MAC.(7)
(i)Enumerate the properties of Hash Function.(7)
14 (ii)Describe the authentication protocol and list its limitations, Analysing BTL-4
how the limitations overcome. (6)
PART - C
Integrate the entire MAC process in detail and also explain the
1 (i) Establishment of Shared Secret,(7) Create BTL-6
(ii) Inability to Provide Non-Repudiation(8)
2 Discriminate the security of hash functions and MACs (15) Evaluate BTL-5
STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.
QUESTION BANK
SUBJECT : CS6701- Cryptography and Network Security
SEM / YEAR: VII/IV
STUDENTSFOCUS.COM
(i)Explain viruses?(3)
3 Evaluate BTL-5
(ii)Evaluate the virus related threats and the counter
measures. (10)
4 Illustrate the three common types of firewalls with Remember BTL-1
diagrams. (13)
5 Explain Secure Electronic Transaction with neat diagram. Remember BTL-1
(13)
(i)Express trusted system? (3)
6 (ii)Explain the basic concept of data access control in Understand BTL-2
trusted systems? (10)
(i) Discuss the architecture of distributed intrusion detection
7 system with the necessary diagrams. (7) Apply BTL-3
(ii) Demonstrate the implementation of cryptography and
security. (6)
(i) Discuss the role of intrusion detection system? What are
the three benefits that can be provided by the intrusion
detection system? (6) Understand
8 BTL-2
(ii) Discuss the architecture of distributed intrusion
detection system with the necessary diagrams. (7)
Illustrate the following
Apply BTL-3
(i) statistical anomaly detection and (7)
9 & &
(ii) rule based intrusion detection system (6) Analyse BTL-4
(i)Explain the roles of the different servers in Kerberos
protocol. How does the user get authenticated to the
10 different servers?(6) Understand BTL-2
(ii) Discuss how does the encryption key is generated from
password in Kerberos? (7)
(i) Illustrate the various measures that may be used for
11 intrusion detection. (7) Apply BTL-3
(ii) Illustrate trusted systems. (6)
12 Explain how kerberos apply the authentication dialog for Apply BTL-3
obtaining services from another realm. (13)
(i) Discover the participants of SET system, and explain in
13 detail. (7) Apply BTL-3
(ii) Illustrate the Trojan Horse Defence in trusted system.
(6)
14 Describe the different types of firewalls and its Remember BTL-1
configuration in detail. (13)
PART -C
Prepare a summary on the significant types of virus
1 categories. (15) Create BTL-6
STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.
QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV
STUDENTSFOCUS.COM
(i)Describe about the PKI. (7)
3 Remember BTL-1
(ii)Identify the fields in ISAKMP and explain it.(6)
PART - C
Compose how does PGP provide authentication and
1 confidentiality for email services and for file transfer Create BTL-6
applications? (15)
(i)Formulate Security Association? (7)
2 (ii)Invent the parameters that identify the Security Create BTL-6
Association. (8)
(i)Assess the main problem with IPV4 that IPV6 addresses (7)
3 (ii)Decide the factors combined to cause the exhaustion of Evaluate BTL-5
IPV4(8)
STUDENTSFOCUS.COM