OBE Question Bank
OBE Question Bank
Regulations AU – 2021
Academic Year 2023 – 24
CO503.1 Summarize the fundamental concepts of cryptographic and cyber security using
algorithms.(K2)
Sl Question RBT Unit
No. level No.
Part A
1. Define Security trends. K1 I
2. State Legal, Ethical and Professional Aspects of Security. K1 I
3. Give Need for Security at Multiple levels. K I
2
4. Specify Security Policies. K I
1
5. Identify the types of attack. K I
2
6. Define Model of network security. K I
1
7. Identify an example for substitution and transposition ciphers. K I
2
8. Explain network security. K I
2
9. Distinguish Encryption and Decryption. K I
2
10 Define cryptography. K I
. 1
11 What are the 3 aspects of security? K I
. 2
12 Define security mechanisms. K I
. 1
Summarize the difference between Substitution and Transposition
13 K I
techniques.
. 2
Give the list of keys are required for two people to communicate
14 K I
via a cipher.
. 2
15 Compare Block and Stream cipher. K I
. 2
16 Compare cryptanalysis and cryptography K I
. 2
17 Define Steganography. K I
. 1
that a is congruent to71000 modulo 10. (Note that this is the same as
the last digit of the decimal expansion of 71000.)
With a neat sketch explain the Elliptic curve cryptography with an
8 K1 III
example.
9 Describe Modulo Arithmetic operations and properties in detail. K1 II
(i) Describe in detail the key generation in AES algorithm and its
10 expansion format II
K1
(ii)Describe Triple DES and its applications.
11 Describe AES algorithm with all its round functions in detail. K1 II
12 Describe DES algorithm with neat diagram and explain the steps. K1 II
Solve gcd(98, 56) using Extended Euclidean algorithm. Write the
13 K2 II
algorithm also
14 Discuss the following in detail
(i) ModularExponentiation II
K2
(ii) Finite Fields
Explain the DES and General structure of DES with diagrams.
15 K2 II
(13)
(i) Where hash functions are used? What characteristics are needed
in secure hash function? Write about the security of hash functions
16 K1 IV
and MACs.
(ii) Discuss the classification of authentication function in detail.
Describe digital signature algorithm and show how signing and
17 K1 IV
Verification is done using DSS.
18 Describe SHA2 in detail with neat diagram. K1 IV
What is Digital Signature? Explain how it is created at the sender
19 end and retrieved at receiver end .differentiate digital signature IV
K1
from digital certificate.
How Hash function algorithm is designed? Explain their features
20 K2 IV
and Properties.
i) Explain in detail message authentication code and its
21 requirements. K2 IV
(ii)Illustrate the security of hash functions and MACs.
22 Describe Challenge-Response protocols in detail. K2 IV
Describe the working of SET with neat diagram.
23 K1 V
(13)
Describe in detail about SSL/TLS.
24 K1 V
(13)
Explain the architecture of IPsec in detail in detail with a neat block
25 K2 V
Diagram.
26 Describe in detail about S/MIME. K1 V
Discuss authentication header and ESP in detail with their packet
27 K2 V
format.
Describe PGP cryptographic functions in detail with suitable block
28 K1 V
Diagrams.
(i) Write the steps involved in the simplified form of the SSL /
TLS
1 K V
3 protocol. 2
(8)
Generalize the methodology involved in computing the keys in
SSL
/ TLS protocol.
i) Explain the various measures that may be used for intrusion
detection.
1 K V
ii) Explain the various roles of firewalls and related terminology in
4 2
detail. (7)
Explain how secure electronic transaction (SET) protocol enables
15 K2 V
e- transactions. Explain the components involved.
CO503.2: Apply various mathematical concepts relevant to build symmetric and asymmetric
key cryptosystems..(K3)
Sl Question RBT Uni
No. level t
No.
Part A
1. Why is asymmetric cryptography bad for huge data? Specify the reason. K2 III
2. Compare public key and private key. K2 III
3. Explain elliptic curve. K III
2
4. Find gcd (1970, 1066) using Euclid‟s algorithm. K II
3
4. Perform encryption and decryption using Hill Cipher for the following.
K I
Message: PEN and Key: ACTIVATED (13)
3
5. (i) Illustrate the rules to perform encryption using play fair cipher and
encrypt „snowshooos‟ using „monarchy‟ I and J count as one letter and
x is the filler letter. (8) K I
(ii) Encrypt the word “Semester Result” with the keyword 3
“Examination” using playfair cipher. (5)
6. Identify the purpose of Differential and linear cryptanalysis and explain
K II
with neat diagram. (13)
3
7. Discuss the properties that are to be satisfied by Groups, Rings and Fields.
K2 II
(13)
8. Explain about Block cipher design principles – Block cipher mode of
K2 II
operation. (13)
(13)
3 Experiment with Taxonomy of potential attacks on RSA. K III
3
(13)
4 Explain Chinese Remainder theorem and find X
for the given set of congruent equation using
K III
CRT X ≡ 2 (mod 3)X ≡ 3 (mod 5)
3
X ≡ 2 (mod 7)
(7)
State and Prove Fermat‟s theorem.
(6)
5 For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function
(4) K II
ii) f function 3
(3)
iii) Permutation p
(3)
Swapping of halves of the block.
(3)
CO503.3: Apply cryptography algorithms to provide security for real time applications (K3)
(7)
2. Prove the Following
i) If p is a prime and a is a positive integer relatively prime to p, then
p-1
a ≡ 1(mod p)
(7) K1 III
p
ii) If p is a prime and a is a positive integer, then a ≡ a (mod p).
(6)
3. (i) Discuss how discrete logarithm evaluated for a number? What is the
role of discrete log in the Diffie - Hellman key exchange in
exchanging the secret key among two users? (7)
K2 III
What are elliptic curves? And also discuss how the elliptic curves are
useful for Cryptography? (6)
4. Explain the Key generation, encryption, and decryption in ElGamal.
K2 III
(13)
Part C
1. Users Alice and Bob use the Diffie-Hellman key exchange technique
with a common prime q = 83 and a primitive root α = 5.
i) If Alice has a private key XA = 6, what is Alice‟s public key YA? (6) K3 II
ii) If Bob has a private key XB = 10, what is Bob‟s public key YB? (6) I
iii) Construct the shared secret key (3)
2.
3. i) In a public-key system using RSA, you intercept the cipher text C = 10
sent to a user whose public key is e = 5, n = 35. What is the plaintext M?
(8) K3 II
ii) In an RSA system, the public key of a given user is e = 31, n = 3599. I
Determine the private key of this user?
(7)
4. Discuss the ElGamal cryptosystem and elliptic curve cryptosystem (15) K2 II
I
CO503.4: Differentiate the various authentication algorithms used in real time applications.
(K4)
Sl Question RBT Uni
No. level t
No.
Part A
1. State any three requirements for authentication. K1 IV
2. How is the security of a MAC function expressed? K2 IV
3. Identify the requirements for message authentication. K I
3 V
4. Give the two approaches of digital signature. K I
2 V
5. Explain the significance of signature function in Digital Signature
K I
Standard (DSS) approach.
2 V
6. Identify the security services provided by digital signature. K I
3 V
7. How digital signatures differ from authentication protocols? K I
2 V
8. How do you specify various types of authentication protocol? K I
1 V
9. Explain the purpose of X.509 standard. K I
4 V
1 What is Kerberos? Point out its uses. K I
0. 4 V
Part B
1. Explain the different approaches to message authentication K I
2 V
2. Illustrate the steps involved in Signature generation and Verification
K I
Functions of DSS.
3 V
3. Explain in detail about X.509 authentication services. K I
4 V
4. Explain Client Server Mutual authentication with example flow diagram.
I
(13) K
V
4
5. i) What is Kerberos? Explain how it provides authenticated Services. (7)
K I
ii) Explain the format of the X.509 certificate.
4 V
(6)
6. Discuss the roles of the different servers in Kerberos protocol. How does
the user get authenticated to the different servers? K2 IV
(13)
7. Explain briefly about the architecture and certification mechanisms in
K3 IV
Kerberos and X.509. (13)
Part C
1. With a neat diagram, explain the steps involved in SHA algorithm for
K V
encrypting a message with maximum length of less than 2128 bits and
produces as output a 512-bit message digest. 5
(15)
2. (i)Elaborate the way how the limitations of Kerberos version 4 is overcome in
the environmental shortcomings and technical deficiencies. K V
(8) 6
(ii) Elaborate how the encryption is key generated from password in Kerberos.
(7)
1 K1 V
Why is SQL injection used?
8.
1 What prevents SQL injection? K1 V
9.
2 K1 V
What are the types of network access control?
0.
2 What is the principle of NAC? K1 V
1.
2 What is cloud security? K1 V
2.