CS6701CNS QBank
CS6701CNS QBank
6. How many keys are required for two people to communicate via a cipher?
If both sender and receiver se the same key, the system is referred to as symmetric, single
key, secret key, or conventional encryption. If the sender and receiver e ch use a different key, the system
is referred to as asymmetric, two-key, or public-key encryption.
7.What is the difference between a block cipher and a stream cipher?
A block cipher processes the input one block of elements at a time, producing an output block for
each input block.
A stream cipher processes the input elements continuously, producing output one element at a time, as
it goes along.
8.What are the two approaches to attacking a cipher?
The two approaches to attack a cipher are:
Cryptanalysis
Brute-force attack
9.Briefly define the Caesar cipher.
The Caesar cipher involves replacing each letter of the alphabet with the letter standing three
places further down the alphabet. For example:
Plain: meet me after the toga party
Cipher: PHHW PH DIWHU WKH WRJD SDUWB
10.Briefly define the monoalphabetic cipher, playfair cipher and transposition cipher
MonoalphabeticCipher:Its maps from a plain alphabet to cipher alphabet. Here a single cipher
alphabet is used per message.
PlayfairCipher:The best-known multiple-letter encryption cipher is the playfair, which treats
diagrams in the plain text as single units and translates these units into cipher text diagrams.
Transposition cipher:It is a cipher, which is achieved by performing some sort of permutation on the
plaintext letters.
Invisible ink
Pin punctures
Typewriter correction ribbon
13.Why is it not practical to use an arbitrary reversible substitution cipher?
An arbitrary reversible cipher for a large block size is not practical, however, from an
implementation and performance point of view. Here the mapping itself is the key.
14.What is the difference between diffusion and confusion?
Diffusion:
It means each plaintext digits affect the values of many ciphertext digits which is equivalent to each
ciphertext digit is affected by many plaintext digits. It can be achieved by performing permutation on the
data. It is the relationship between the plaintext and ciphertext.
Confusion:
It can be achieved by substitution algorithm. It is the relationship between ciphertext and key.
15.What is the difference between a mono alphabetic cipher and a poly alphabetic cipher?
Mono alphabetic cipher: Here a single cipher alphabet is used.
Poly alphabetic cipher: Here a set of related mono alphabetic substitution rules is used.
16.List the types of cryptanalytic attacks.
Cipher text only Known plaintext Chosen plaintext Chosen cipher text Chosen text
17. Differentiate symmetric and asymmetric encryption?
Symmetric: A single key is used for both the encryption and decryption
Asymmetric: More than one keys are used for both the encryption and decryption
18. Define integrity and nonrepudiation?
Integrity:Service that ensures that only authorized person able to modify the message.
Non-repudiation:This service helps to prove that the person who denies the transaction is true or
false.
19. Explain active and passive attack with example.
Passive attack: Monitoring the message during transmission. Eg: Interception
Active attack:It involves the modification of data stream or creation of false data
stream.E.g.: Fabrication, Modification, and Interruption
20.Definecryptanalysis,cryptology and cryptography?
Cryptanalysis: techniques used for deciphering or decrypting a message without the knowledge of
the enciphering or encrypting details is said to be cryptanalysis.
Cryptology: the study of cryptography and cryptanalysis together is called cryptology.
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
Cryptography:It is a science of writing Secret code using mathematical techniques. The many
schemes used for enciphering constitute the area of study known as cryptography.
30.Define divisibility
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
The extended Euclidean algorithm can calculate the gcd (a, b) and at the same time calculate the value of s
and t.
35. Write the particular solution and general solution of linear Diophantine equation?
Particular solution:
x0 = (c/d)s and y0 = (c/d)t
General solutions:
x = x0 + k (b/d) and y = y0 − k(a/d) where k is an integer
36. Find the particular and general solutions to the equation ?
21x + 14y = 35.
First version:The First version of Euler’s theorem is similar to the First version of the Fermat’s little
theorem.If a and n are coprime,thenaφ(n) ≡1 (mod n)
Second version: The Second version of Euler’s theorem is similar to the Secondversion of the Fermat’s
little theorem;it removes the condition that a and n should be coprime.If n-=p*q,a<n,and k an integer, then
ak* φ(n)+1≡a (mod n)
45. Give the formula for Mersenne primes and fermat primes
Mersenne defined the formula called Mersenne numbers that are used to enumerate all primes.
Mp=2p-1
Fermat tries to find a formula to generate primes.
Fn=22n+1
(iii) Since (6, 15) = 3, we can’t apply the theorem above directly again. However, canceling out 3, we
obtain 2x ≡ 1 mod 5. Note that (2, 5) = 1. Therefore we can apply the theorem above to the new equation.
Since 2 · 3 ≡ 1 mod 5, we get x ≡ 1 · 3 ≡ 3 mod 5.
(iv)Since (8, 18) = 2, we can’t apply the theorem above directly. We now note that 8x ≡7 mod 18 is
equivalent to 8x − 18y = 7, which is impossible, since the left-hand side is divisible by 2,whereas the
right-hand side is not. So, this equation has no solutions.
(v)We first rewrite this congruence as 9x ≡ 5 mod 25. Note that (9, 25) = 1. Therefore wecan apply the
theorem above. Since 9 · 14 ≡ 1 mod 25, we get x ≡ 5 · 14 ≡ 70 ≡ 20 mod 25.
Solution: Since (2, 8) = 2, we can’t apply the theorem above directly. We now note that 2x ≡ 5
mod 8is equivalent to 2x − 8y = 5, which is impossible, since the left-hand side is divisible by 2, whereas
theright-hand side is not. So, this equation has no solutions.
53. Write about Miller rabin test and pollard rho method?
The miller Rabin algorithm is used for testing whether a given number is prime. In fact we shall
consider the decisional problem, IsComposite, to decide whether a given number is composite.
IsComposite
Input: A positive integer n>=2
Yes-No problem:Is n composite?
pollard rho method:Pollard developed second method for factorization. The pollard rho is based on the
following points. Assume that there are two integers x1 and x2 such that p divides x1-x2, but n does not.It
can be proven that p=gcd(x1-x2, n) because p divides x1-x2, it can be written as x1-x2 =q*p but because n
does not divide x1-x2, it is obvious that q does not divide n. This means that gcd(x1-x2, n) is either 1 or a
facyor of n.
A service that enhances the security of the data processing systems and the information transfer
of an organization.The services are intended to counter security attack, and they make use of one or more
security mechanism to provide the service.
9. What is the difference between link and end to end encryption?
Link Encryption
1. With link encryption, each vulnerable the Communications link is equipped on encryption.
2. Transperant to ser
3. Provides host authentication
4. Can be done in hardware
5. One facility for ll users
End to End Encryption
1. With end to end encryption, the encryption process is carried out at the t o end system.
2. User applies encryption
3. Provides user authentication
4. Software implementations
5. Users selects encryption scheme
10. What is traffic Padding? What is its purpose?
Traffic padding produces ciphertext output continuously, even in the absence of the plain text. A
continuous random data stream is generated. When plain text is available, it is encrypted and transmitted.
When input plaintext is not present, random data are encrypted and transmitted. This makes it impossible
to for an attacker to distinguish between true dataflow and padding and therefore impossible to deduce the
amount of traffic.
11. List the evaluation criteria defined by NIST for AES?
The evaluation criteria for AES is as follows: 1.Security
2. Cost
3. Algorithm and implementation characteristics
12. What is Triple Encryption? How many keys are used in triple encryption?
Triple Encryption is a technique in which encryption algorithm is performed three times
sing three keys.
13. What is the purpose of the State array?
A single 128-bit block is depicted as a square matrix of bytes. This block is copied into the St terr y,
which is modified at each stage of encryption or decryption After the final stage, State is copied to an
output matrix.
14. How is the S-box constructed?
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
The S-box is constructed in the following fashion: Initialize the S-box ith the byte values in
ascending sequence row by row. The first row contains {00}, {01}, {02}, ……….., {0F}; the second row
contains{10},{11},etc; and so on. Thus, the value of the byte at row x, column y is {x y}. Map each byte
in the S-box to its multiplicative inverse in the finite field GF (28); the value {00} is mapped to itself.
Consider that each byte in the S-box consists of 8 bits labeled (b7,b6,b5,b4,b3,b2,b1,b0).Apply the
following transformation to each bit of each byte in the S-box.
15. Briefly describe Sub Bytes.
Sub byte uses an S-box to perform a byte-by-byte substitution f the block. The left most 4 bits of
the byte are used as row value and the rightmost 4 bits are used as a column value. These row and column
values serve as indexes into the S-box to select a unique 8- bit value.
16. Briefly describe Shift Rows .
In shift row, a row shift moves an individual by e from one column to another, which is a linear
distance of a multiple of 4 bytes. In Forward Shift Row, each row perform circular left shift. Second Row
a 1-byte circular left shift is performed. Third Row a 2-byte circular left shift is performed. For the Fourth
Row a 3-byte circular left shift is performed. In Inverse Shift Row, each row perform circular right shift.
17. How many bytes in State are affected by Shift Rows?
Totally 6-bytes in state are affected by Shift Rows.
18. Briefly describe Mix Columns.
Mix Column is substitution that makes use of arithmetic over GF(28).Mix Column operates on
each column individually. Each byte of a column is mapped into a new value that is a function of all four
bytes in the column. The Mix Column Transformation combined with the shift row transformation ensures
that after a few rounds, all output bits depend on all input bits.
19. Briefly describe Add Round Key.
In Add Round Key, the 128 bits of State are bit wise XORed with the 128 bits of the round key.
The operation is viewed as a column wise operation between the 4 bytes of a State column and one word
of the round key; it can also be viewed as a byte-level operation. The Add Round Key transformation is as
simple as possible and affects every bit f State.
20. Briefly describe the Key Expansion Algorithm
The AES key expansion algorithm takes as input a 4-word(16-byte) key and produces a linear
array of 44 words(156 byt ). This is ufficient to provide a 4-word round key for the initial Add Round K y
stage and each of the 10 rounds of the cipher.
21. What is the difference between Sub Bytes and Sub Word? Sub Bytes:
Sub Bytes uses an S-box toperform a byte-by-byte substitution of the
block.
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
Sub Word:
Sub Word performs byte substitution on each byte of its input word,using the Sbox
22. What is the difference between Shift Rows and Rot Word? Shift Rows:
Shift Row is simple permutation. It shifts the rows circularly left or
right.
Rot Word:
Rot word performs a one-byte circular left shift on a word. This means that an input word
[b0,b1,b2,b3] is transformed into [b1,b2,b3,b0].
23 . Why do some block cipher modes of operation only use
encryption while others use both encryption and decryption?
Some block cipher modes of operation only use encryption because the input is set to some
initialization vector and the leftmost bits of the output of the encryption function are XORed with the first
segment of plain text p1 to produce the first unit of cipher text C1 and it is transmitted. While in
decryption, the cipher text is XORed with the output of the en rypti n function to produce the plain text.
24. What is triple encryption?
Tuchman proposed a triple encryption m hod hat uses only two keys [TUCH79]. The function
follows an encrypt – decrypt – encrypt (EDE) sequence. C=E [D [E [P]]]
k1 k2 k1
There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is
that it allows users of 3DES to decrypt data encrypted by users of the older single DES:
Hash function: Some function that map a message of any length to fixed length which serves as
authentication.
3. What are the requirements for message authentication?
The requirements for message authentication are
Disclosure:Release of message contents to any person or process not processing the appropriate
cryptographic key
Traffic Analysis: Discovery of the pattern of traffic between parties. In a connection oriented
application, the frequency and duration of connections could be determined. In either a connection
oriented or connectionless environment, the number and length of messages between parties could be
determined.
Masquerade: Insertion of messages into the network from a fraudulent source. This includes the
creation of messages by an opponent that are purported to come from an authorized entity. Also included
are fraudulent acknowledgements of message receipt or no receipt by someone other than the message
recipient.
Content modification: Changes to the contents of a message , including insertion, deletion,
transposition, and modification.
Sequence modification: Any modification to a sequence of messages between parties, including
insertion, deletion, and modification.
Timing modification: Delay or replay of messages. In a connection oriented application, an entire
session or sequence of messages could be a replay of some previous valid session, or individual messages
in the sequence could be delayed or replayed. In connectionless application, an individual message could
be delayed or replayed.
Source repudiation: Denial of transmission of message by source.
Destination repudiation: Denial of receipt of message by destination.
It must verify the author and the data and time of signature.
It must authenticate the contents at the time of signature.
It must be verifiable by third parties to resolve disputes.
18. What requirements should a digital signature scheme should satisfy?
The signature must be bit pattern that depends on themessage being signed.
The signature must use some information unique to the sender, to prevent both forgery and denial.
It must be relatively easy to produce the digital signature.
It must be relatively easy to recognize and verify the digital signature.
It must be computationally infeasible to forge a digitalsignature, either by constructing a new
message for an existing digital signature or by constructing a fraudulentdigital signature for a given
message.
It must be practical to retain a copy of the digital signaturein storage.
19.What is Digital Signature?
A digital signature is an authentication mechanism that enables the creator of a message to attach a
code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the
message with the creator's private key. The signature guarantees the source and integrity of the message.
20.List the Digital Signature Algorithms.
RSA
ElGamal
DSA
21.What is Birthday attack ?
This cryptanalytic attack attempts to find two values in the domain of a function that map to the
same value in its range
22.DefineElGamal Public Key Cryptosystem.
ElGamal Public Key Cryptosystem is an asymmetric key encryption for public key cryptography
based on Diffie-Hellman Key Exchange
23. What is one way function?
One way function is one that map the domain into a range such that every function value has a
unique inverse with a condition that the calculation of the function is easy where as the calculations of the
inverse is infeasible.
24.DefineSchnorr?
Schnorr Digital Signatures also uses exponentiation in a finite (Galois)security based on discrete
logarithms, as in D‐H.Minimizes message dependent computation : multiplying a 2n‐bit integer with an
n‐bit integer.Main work can be done in idle time using a prime modulus p – p–1 has a prime factor q of
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
PART-B
1.Explain about Elgamal cryptosystem.
2.llustrate with appropriate diagrams the basic uses of Hash Function.
3.Describe briefly about MD5.
4.Explain in brief about digital signature.
5.Explain Authentication protocols.
A full service Kerberos environment consisting of a Kerberos server, a no. of clients, no.of
application server requires the following:
The Kerberos server must have user ID and hashed password of all participating users in its database.
The Kerberos server must share a secret key with each server.Such an environment is referred to as
“Realm”.
2. Assume the client C wants to communicate server S using Kerberos procedure. How can it be
achieved?
Dialogue between client „C‟ , server „S‟ and authentication erver(AS) are given below
X.509 defines framework for authentication services by the X.500 directory to its users X.509
defines authentication protocols based on public key certificates
25.Define Firewall.
A firewall is a device or set of devices designed to permit or deny network transmissions based
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
upon a set of rules and is frequently used to protect networks from unauthorized access.
E-Mail systems only permit the use of blocks consisting of ASCII text. To
accommodate this restriction PGP provides the service converting the row 8-bit binary stream to a stream
of printable ASCII characters. The scheme used for this urpose is Radix-64 conversion.
PGP assigns a key ID to each public key that is very high probability unique with a user ID. It is also
required for the PGP digital signature. The key ID associated with each public key consists of its least
significant 64bits.
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
6. Audio type.
7. Application type
15.What are the key algorithms used in S/MIME?
DSS
DiffiHelman
RSA
Padding(0-255 bytes)
21.What is Authentication Header? Give the format of the IPsec Authentication Header?
It provides the authentication of IP Packet, so authentication is based on the use of MAC.
Format of IPsec Authentication Header:
Next Header(TCP) Payload Header Reserved
Security Parameter Index(SPI)
Sequence Number
ICV:Integrity Check Value
(HMAC of IP Header,AH,TCP payload)
22. Mention the benefits of IPSec.
It provides strong security that can be applied to all traffic crossing the perimeter.
IPSec in a firewall is resistant to bypass.
IPSec is below the transport layer and so is transparent to applications.
IPSec is transparent to users.
23. List out the services provided by the IPSec.
a. Access control
b. Connectionless integrity
c. Data origin authentication
d. Rejection of replayed packets Confidentiality
f. Limited traffic flow confidentiality
24. What is the need of public key ring and private key ring?
Public key ring is one of the data structures which is used to store the public keys of the other
participants
Private Key ring is a data structure which is used to store the public and the private keys of the
owner alone.
25. Why do we need an anti replay service?
Anti replay service is required in order to avoid the duplicate packets (created by the opponent)
which may cause disruption in the service.
26.What is the need padding in Encapsulating Security Payload (ESP)?
a. If an encryption algorithm requires the plaintext to be a multiple of some number of bytes, the
padding field is used to expand the plaintext to the required length.
b. ESP format requires that the pad length and the next header fields be right aligned within a 32-
bit word. The padding field is used to assure this alignment.
c. Additional padding may be added to provide partial traffic flow confidentiality by concealing
the actual length of the payload.
CS6701-CRYPTOGRAPHY AND NETWORK SECURIT
MAC(0,16or 20 bytes)
PART-B