cs8792 QB
cs8792 QB
in
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203
n
g.i
QUESTION BANK
n
eri
g ine
En
arn
VII SEMESTER
Le
Regulation – 2017
w.
Prepared by
n
cryptosystem – cryptanalysis
g.i
PART – A
BT
Q.No Questions Level Competence
n
1. Define Security trends. BTL1 Remembering
eri
2. State Legal, Ethical and Professional Aspects of Security. BTL1 Remembering
3. Give Need for Security at Multiple levels. BTL2 Understanding
ine
4. Specify Security Policies. BTL1 Remembering
5. Identify the types of attack. BTL3 Applying
6. Define Model of network security. BTL1 Remembering
g
techniques.
Give the list of keys are required for two people to communicate via a
14. cipher. BTL2 Understanding
w.
n
encrypted by Caesar cipher and k=5. Try to decrypt the message.
g.i
8. (7) BTL3 Applying
(ii) Using Vigenere cipher, encrypt the word “explanation” using the
Key leg. (6)
n
Encrypt the following using play fair cipher using the keyword
9. MONARCHY. Use X for blank spaces “SWARAJ IS MY BIRTH RIGHT” BTL3 Applying
eri
(13)
Perform encryption and decryption using Hill Cipher for the following.
10 BTL4 Analyzing
Message: PEN and Key: ACTIVATED (13)
ine
(i) Classify and briefly define types of cryptanalytic attacks based on what is
11. known to the attacker. (7) BTL4 Analyzing
(ii) Explain briefly the two general approaches to attacking a cipher. (6)
Explain the network security model and its important parameters with a neat
g
PART C
1. Illustrate the Classical Encryption Technique with an example (15) BTL6 Creating
w.
(i) Illustrate the rules to perform encryption using play fair cipher and
encrypt ‘snowshooos’ using ‘monarchy’ I and J count as one letter and
2. x is the filler letter. (8) BTL6 Creating
ww
(ii) Encrypt the word “Semester Result” with the keyword “Examination”
using playfair cipher. (7)
Encrypt the message “FINALYEAR” at the sender end and decrypt the
message at receiver end With using Hill-cipher with the key. (15)
3. BTL5 Evaluating
n
3 Why set of all Integers is not a field? BTL1 Remembering
g.i
Assume that a = 255 and n = 11. We can find q = 23 and r = 2 using the
4 division algorithm we have learned in arithmetic. Calculate q and r for BTL3 Applying
a= -255 and n=11
n
5 Define Finite Group BTL1 Remembering
eri
6 Find gcd (1970, 1066) using Euclid’s algorithm. BTL3 Remembering
7 Summarize the properties of congruence’s. BTL2 Understanding
ine
8 State the five modes of operation of block cipher? BTL2 Understanding
9 Explain the strength of triple DES. BTL2 Understanding
10 Explain S-DES Structure. BTL2 Understanding
g
11 What is triple encryption? How many keys are used in triple encryption? BTL1 Applying
En
7
14 Find 11 mod 13. BTL4 Applying
15 Compare DES and AES. BTL4 Analyzing
List the parameters (block size, key size and no. of rounds) for the three
Le
16 BTL4 Analyzing
AES versions.
17 Explain idea of RC4 stream cipher. BTL5 Evaluating
w.
7 Explain the DES and General structure of DES with diagrams. (13) BTL2 Understanding
Identify the purpose of Differential and linear cryptanalysis and explain
8 BTL3 Applying
with neat diagram. (13)
For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function (4)
9 BTL3 Applying
ii) f function (3)
iii) Permutation p (3)
iv) Swapping of halves of the block. (3)
Explain the following modes of operation in block cipher.
10 (i) Electronic code book and Cipher block chaining. (7) BTL4 Analyzing
(ii) Cipher feedback mode and output feedback mode. (6)
n
(i) How Meet in the middle attack is performed on double Data
encryption Standard? (7)
g.i
11 BTL4 Analyzing
(ii) Explain the substitution bytes transformation and add round key
transformation of AES cipher. (6)
Discuss the properties that are to be satisfied by Groups, Rings and Fields.
n
12 BTL4 Analyzing
(13)
Explain about Block cipher design principles – Block cipher mode of
eri
13 BTL5 Evaluating
operation. (13)
14 Discuss about Public Key distribution and Symmetric-Key Distribution.(13) BTL6 Creating
ine
PART C
What do you mean by AES? Diagrammatically illustrate the structure of
1. BTL6 Creating
AES and describe the steps in AES encryption process with example. (15)
g
Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-
Elliptic curve cryptography.
PART – A
ww
BT
Q.No Questions Competence
Level
1. Define Coprimes. BTL1 Remembering
2. Define Euler’s theorem. BTL1 Remembering
3. What is a primitive root of a number? BTL1 Remembering
4. State Fundamental Theorem of Arithmetic. BTL1 Remembering
5. Define Euler’s totient function. BTL1 Remembering
6. State Fermat’s little theorem. BTL1 Remembering
Assume n has 200 bits. Give the number of bit operations needed to run the
7. divisibility-test algorithm? BTL2 Understanding
8. Why is asymmetric cryptography bad for huge data? Specify the reason. BTL2 Understanding
For More Visit : www.LearnEngineering.in
For More Visit : www.LearnEngineering.in
n
Perform encryption and decryption using RSA algorithm for the following.
17. p=7, q=11; e=17; m=8. BTL5 Evaluating
g.i
18. Prepare any one technique attacking in RSA. BTL5 Evaluating
Predict differences between Conventional Encryption and Public-Key
19. BTL6 Creating
Encryption.
n
20. Are strong primes necessary in RSA? BTL6 Creating
eri
PART – B
ine
i. Describe RSA algorithm (6)
1 ii.Perform encryption and decryption using RSA algorithm for the BTL1 Remembering
following: p=7 q=11, e=7, M=9. (7)
g
2 BTL1 Remembering
ap-1≡ 1(mod p) (7)
(ii). If p is a prime and a is a positive integer, then ap ≡ a (mod p). (6)
Prove the following
arn
n
Users Alice and Bob use the Diffie-Hellman key exchange technique with
a common prime q = 83 and a primitive root α = 5.
g.i
1. i) If Alice has a private key XA = 6, what is Alice’s public key YA? (6) BTL6 Creating
ii) If Bob has a private key XB = 10, what is Bob’s public key YB? (6)
iii) Construct the shared secret key (3)
n
State and prove the Chinese remainder theorem. What are the last two
eri
2. BTL6 Creating
digits of 4919? (15)
i) In a public-key system using RSA, you intercept the cipher text C = 10
sent to a user whose public key is e = 5, n = 35. What is the plaintext M? (8)
3. BTL5 Evaluating
ine
ii) In an RSA system, the public key of a given user is e = 31, n = 3599.
Determine the private key of this user? (7)
4. Discuss the ElGamal cryptosystem and elliptic curve cryptosystem (15) BTL5 Evaluating
g
En
Level
1. State any three requirements for authentication. BTL1 Remembering
2. Point out the properties a digital signature. BTL4 Analyzing
w.
n
1 BTL1 Remembering
MACs. (7)
g.i
(ii)Discuss the classification of authentication function in detail. (6)
Describe digital signature algorithm and show how signing and
2 BTL1 Remembering
Verification is done using DSS. (13)
n
3 Describe SHA2 in detail with neat diagram. (13) BTL1 Remembering
eri
What is Digital Signature? Explain how it is created at the sender end and
4 retrieved at receiver end .differentiate digital signature from digital BTL1 Remembering
certificate. (13)
ine
How Hash function algorithm is designed? Explain their features and
5 BTL2 Understanding
properties. (13)
i) Explain in detail message authentication code and its requirements. (7)
6 BTL2 Understanding
ii)Illustrate the security of hash functions and MACs . (6)
g
PART C
With a neat diagram, explain the steps involved in SHA algorithm for
1 encrypting a message with maximum length of less than 2128 bits and BTL5 Evaluating
produces as output a 512-bit message digest. (15)
Create the process of deriving eighty 64-bit words from 1024 bits for
2 processing Of a single blocks and also discuss single round function in BTL6 Evaluating
SHA-512 algorithm. Show the values of W16, W17, W18 and W19. (15)
(i) Enumerate the properties of Hash Function. (8)
3. (ii) Evaluate the authentication protocol and list its limitations, how the BTL5 Creating
limitations overcome. (7)
(i)Elaborate the way how the limitations of Kerberos version 4 is overcome
4. in the environmental shortcomings and technical deficiencies. (8)
(ii) Elaborate how the encryption is key generated from password in BTL6 Creating
Kerberos. (7)
For More Visit : www.LearnEngineering.in
For More Visit : www.LearnEngineering.in
n
5. Identify the benefits of IPSecurity. BTL1 Remembering
g.i
6. Identify the five header fields defined in MIME. BTL1 Remembering
7. How can the signed data entity of S/MIME be prepared? Give the steps. BTL2 Understanding
n
8. Differentiate transport and tunnel mode in IPsec. BTL2 Understanding
eri
9. Point out the services provided by PGP? BTL5 Evaluating
10. Explain the protocols used to provide IP security. BTL2 Understanding
ine
11. What is a virus in a computer? Classify the types of viruses. BTL3 Applying
12. What are the various types of firewall and its design goal? BTL3 Applying
13. Identify the three classes of Intruders. BTL3 Applying
g
15. State the difference between threats and attacks. BTL4 Analyzing
16. Differentiate spyware and virus. BTL4 Analyzing
arn
17. Give the advantages of intrusion detection system over firewall. BTL2 Understanding
18. Show the design goals of firewalls. BTL6 Evaluating
19. Discriminate statistical anomaly detection and rule based detection BTL5 Creating
Le
20. Does the firewall ensure 100% security to the system? Comment. BTL6 Creating
PART-B
w.
1 Describe the working of SET with neat diagram. (13) BTL1 Remembering
2 Describe in detail about SSL/TLS. (13) BTL1 Remembering
ww
n
1. Evaluate the performance of PGP. Compare it with S/MIME. (15) BTL5 Creating
g.i
(i) Write the steps involved in the simplified form of the SSL / TLS
protocol. (8)
2. BTL6 Creating
(ii) Generalize the methodology involved in computing the keys in SSL /
n
TLS protocol. (7)
(i) Explain the various measures that may be used for intrusion detection.
eri
(8)
3. BTL5 Evaluating
(ii) Explain the various roles of firewalls and related terminology in detail.
(7)
ine
Elaborate how secure electronic transaction (SET) protocol enables e-
4. BTL6 Evaluating
transactions. Explain the components involved. (15)
g
En
arn
Le
w.
ww