0% found this document useful (0 votes)
78 views5 pages

Suggested Questions Crypto2

mn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views5 pages

Suggested Questions Crypto2

mn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CRYPTOGRAPHY AND NETWORK SECURITY

PAPER CODE: IT604B

Introduction to the Concepts of Security


1. What are passive threats and active threats? Differentiate between passive threats and active
threats.
2. What is IP sniffing and IP spoofing?
3. What is Brute force attack? What are the different types of cryptanalytic attacks?
4. What is a worm? How does it differ from a virus?
5. Explain DOS attack.
Cryptographic Techniques
1. What are the differences between symmetric key and asymmetric key cryptography?
2. Explain briefly Diffie-Hellman symmetric key exchange algorithm with example.
3. What is Brute force attack and Man-in-the Middle attack? Explain with example.
4. Explain the significance of One-Time Pad’ in cryptography.
5. For a Vernam Cipher do the following:
Using one-time pad “NCBTZQARX” encode "HOW ARE YOU".
6. Convert plain text to cipher test using Play Fair method.
The key is ‘MONARCHY' and the plain text "FACTIONALISM”.
Computer Based Symmetric Key Cryptographic Algorithms
1. What is the difference between stream cipher and block cipher?
2. What are different algorithm modes? Explain those which are applied on block ciphers.
3. Explain Cipher Block Chaining mode with a suitable diagram.
4. What types of attacks may occur on block ciphers?
5. Describe a single round of DES with block diagram.
6. What is Triple DES? Why Triple DES is more secure than DES?
7. State and explain how IDEA works.
Computer Based Asymmetric Key Cryptographic Algorithms
1. Write down RSA algorithm?
2. In RSA system, the public key of a user is 17 and N = 187. Calculate the private key and
public key?
3. In the public-key system using RSA, you intercept the cipher text CT=1570 sent to a user
whose public key is E=79, N=3337. What is the plain text PT.
4. Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7 and N=5.
5. What is key wrapping? How is key wrapping useful?
6. What is digital signature? How digital signatures can be generated?
7. What do you mean by message digest? What are the key requirements of message digest?
8. What is the difference between MAC and Message Digest?
9. What is a digital envelope? Explain, how digital envelope works.
Internet Security Protocol
1. What are the different protocols associated with SSL? Describe the fields of SSL record
protocol header.
2. How pre-master-secret and master-secret is prepared in SSL handshake protocol?
3. What steps are involved in the SSL handshake Protocol?
4. Explain SET with a suitable model.
5. Explain PGP? Explain how authentication and confidentiality is maintained in PGP?
6. Explain briefly the base-64 conversion in PGP.
7. Write a short note on S/MIME.
8. What is Electronic Money?
User Authentication Mechanisms
1. How does certificate-based authentication work?
2. What are the differences between authentication and authorization?
3. What are the services provided by IPSec?
4. List the approaches for the intrusion detection?
5. Explain briefly clear text password authentication with example.
Network Security
1. Explain firewall design principles, characteristics, and types of firewalls.
2. Briefly explain working principle of each type of firewall.
3. Write a short note on DMZ network.

Multiple Choice Type Questions

1. The principle of ................ ensures that only the sender and the intended recipient(s) have
access to the contents of a message-
a) Authentication
b) Confidentiality
c) Integrity
d) None of these
2. RSA.............. be used for Digital Signatures
a) Must not
b) cannot
c) Can
d) should not.
3. While creating an envelope, we encrypt the ..................... with the................
a) sender's private key, one time session key
b) receiver's public key, one time session key
c) one time session key, sender's private key
d) one time session key, receiver's public key.
4. DOS attacks are caused by
a) Alternation
b) authentication
c) Fabrication
d) replay attacks.
5. DES encrypts blocks of.............. bits
a) 32
b) 56
c) 64
d) 128
6. Caesar Cipher is an example of
a) Substitution Cipher
b) Transposition Cipher
c) Substitution as well as Transposition Cipher
d) None of these
7. Which one of the following algorithms is not used in asymmetric-key cryptography?
a) RSA algorithm
b) Diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
8. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
9. In MD-5 the length of the message digest is
a) 160
b) 128
c) 64
d) 54
10. We require................. to verify digital signature.
a) sender’s private key
b) receiver’s private key
c) sender and receiver’s public key
d) all the connected devices to the network
11. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
12. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned.
13. ECB stands for
(a) Electronic Control Book
(b) Electronic Code Book
(c) Electronic Cipher Book
(d) Electronic Cryptography Book
14. The number of rounds in RC5 can range from 0 to
(a) 127
(b) 63
(c) 255
(d) 31
15. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if
two parties are not
(a) Authenticated
(b) Joined
(c) Submit
(d) Separate
16. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find
the cipher text.
(a) C=80
(b) C = 92
(c) C= 56
(d) C = 23
17. A cipher in which the order is not preserved
(a) Polyalphabetic substitution based
(b) Transposition-based
(c) Substitution base
(d) Public key based
18. When a hash function is used to provide message authentication, the hash function value is
referred to as
(a) Message Field
(b) Message Digest
(c) Message Score
(d) Message Leap
19. SET is a
(a) Electronic payment system
(b) Security protocol
(c) Credit card payment infrastructure
(d) Internet payment system
20. Data Authentication Algorithm (DAA) is based on
(a) DES
(b) AES
(c) MD-5
(d) SHA-1
21. Triple-DES has ______ keys.
(a) 1
(b) 2
(c) 5
(d) 4
22. A small program that changes the way a computer operates.
(a) Worm
(b) Trojan
(c) Virus
(d) Bomb

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy