Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

www.rejinpaul.

com
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING
&
DEPARTMENT OF INFORMATION TECHNOLOGY

QUESTION BANK

VII SEMESTER

CS8792 - CRYPTOGRAPHY AND NETWORK SECURITY

Regulation – 2017

Academic Year 2020 – 2021 (ODD SEMESTER)

Prepared by

Dr. S. JEYALAKSHMI, Assistant Professor (Sel. G) / IT

Mr. N. LEO BRIGHT TENNISSON, Assistant Professor (Sr. G.) / CSE

Ms. A.VIDHYA, Assistant Professor (Sr. G.) / CSE

Mr. G. VIVEKANANDAN, Assistant Professor (O.G) / IT

Download updated materials from Rejinpaul Network App


www.rejinpaul.com
SRM VALLIAMMAI ENGINEERING COLLEGE
(An Autonomous Institution)
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF INFORMATION TECHNOLOGY


QUESTION BANK
SUBJECT : Cryptography and Network Security
SEM / YEAR : VII Sem / IV Year
UNIT I -INTRODUCTION
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels,
Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security
architecture – Classical encryption techniques: substitution techniques, transposition techniques,
steganography).- Foundations of modern cryptography: perfect security – information theory – product
cryptosystem – cryptanalysis
PART – A
BT
Q.No Questions Level Competence
1. Define Security trends. BTL1 Remembering
2. State Legal, Ethical and Professional Aspects of Security. BTL1 Remembering
3. Give Need for Security at Multiple levels. BTL2 Understanding
4. Specify Security Policies. BTL1 Remembering
5. Identify the types of attack. BTL3 Applying
6. Define Model of network security. BTL1 Remembering
7. Identify an example for substitution and transposition ciphers. BTL3 Applying
8. Explain network security. BTL2 Understanding
9. Distinguish Encryption and Decryption. BTL4 Analyzing
10. Define cryptography. BTL1 Remembering
11. What are the 3 aspects of security? BTL3 Applying
12. Define security mechanisms. BTL1 Remembering
Summarize the difference between Substitution and Transposition
13. BTL2 Understanding
techniques.
Give the list of keys are required for two people to communicate via a
14. cipher. BTL2 Understanding
15. Compare Block and Stream cipher. BTL4 Analyzing
16. Discuss cryptanalysis and cryptography BTL6 Creating
17. Define Steganography. BTL5 Evaluating
Decipher the following cipher Text using brute force attack:
18. BTL5 Evaluating
CMTMROOEOORW (Hint: Algorithm-Rail fence)
Convert the Given Text “VALLIAMMAI” into cipher text using Rail
19. fence Technique. BTL6 Creating
20. Differentiate active attack and passive attack. BTL4 Analyzing
PART – B
1. Describe the differences between steganography and cryptography with
BTL1 Remembering
example in details. (13)
2. (i)Define Security trends - Legal, Ethical and Professional Aspects of
Security. (7)
BTL1 Remembering
(ii) State about the Security at Multiple levels and explain Security
Policies.(6)
3. Describe:
BTL1 Remembering
(i) Playfair cipher (5) ii) Railfence cipher (4) iii)Vignere cipher (4)
Download updated materials from Rejinpaul Network App
www.rejinpaul.com
(i) Describe the following
a) Message Integrity (2) b) Denial of Service (2)
4. c) Availability (2) d)Authentication (2) BTL1 Remembering
(ii) List and briefly describe categories of passive and active security
attacks. (5)
i) Define Steganography? Describe various techniques used in
5. Steganography. (7) BTL2 Understanding
ii)State mono-alphabetic cipher? How it is different from Caesar cipher (6)
(i) Discuss the substitution Techniques in detail. (7)
6. BTL2 Understanding
(ii) Discuss the Transposition Techniques in detail. (6)
(i) Discuss the various security mechanisms. (7)
7. BTL2 Understanding
(ii) Summarize OSI security architecture model with neat diagram. (6)
(i) Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, the message is
encrypted by Caesar cipher and k=5. Try to decrypt the message.
8. (7) BTL3 Applying
(ii) Using Vigenere cipher, encrypt the word “explanation” using the
Key leg. (6)
Encrypt the following using play fair cipher using the keyword
9. MONARCHY. Use X for blank spaces “SWARAJ IS MY BIRTH RIGHT” BTL3 Applying
(13)
Perform encryption and decryption using Hill Cipher for the following.
10 BTL4 Analyzing
Message: PEN and Key: ACTIVATED (13)
(i) Classify and briefly define types of cryptanalytic attacks based on what is
11. known to the attacker. (7) BTL4 Analyzing
(ii) Explain briefly the two general approaches to attacking a cipher. (6)
Explain the network security model and its important parameters with a neat
12. BTL4 Analyzing
block diagram. (13)
Evaluate the Characteristics of Modern Cryptography and working
13. BTL5 Evaluating
Principle. (13)
Encrypt the message “PAY” using hill cipher with the following key matrix
and show the decryption to get original plain text. (13)
14. BTL6 Creating

PART C

1. Illustrate the Classical Encryption Technique with an example (15) BTL6 Creating
(i) Illustrate the rules to perform encryption using play fair cipher and
encrypt ‘snowshooos’ using ‘monarchy’ I and J count as one letter and
2. x is the filler letter. (8) BTL6 Creating
(ii) Encrypt the word “Semester Result” with the keyword “Examination”
using playfair cipher. (7)
Encrypt the message “FINALYEAR” at the sender end and decrypt the
message at receiver end With using Hill-cipher with the key. (15)
3. BTL5 Evaluating

Compare transposition cipher and substitution cipher. Apply two stage


4. transpositions Cipher on the “treat diagrams as single units” using the BTL5 Evaluating
keyword “sequence”. (15)

Download updated materials from Rejinpaul Network App


www.rejinpaul.com
UNIT II - SYMMETRIC CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic-
Euclid’s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields- SYMMETRIC KEY
CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear
cryptanalysis - Block cipher design principles – Block cipher mode of operation – Evaluation criteria for
AES – Advanced Encryption Standard - RC4 – Key distribution
PART – A
BT
Q.No Questions Competence
Level
1 Write the Euclidean Algorithm. BTL1 Remembering
2 List the fundamental elements of abstract algebra or modern algebra BTL1 Remembering
3 Why set of all Integers is not a field? BTL1 Remembering
Assume that a = 255 and n = 11. We can find q = 23 and r = 2 using the
4 division algorithm we have learned in arithmetic. Calculate q and r for BTL3 Applying
a= -255 and n=11
5 Define Finite Group BTL1 Remembering
6 Find gcd (1970, 1066) using Euclid’s algorithm. BTL3 Remembering
7 Summarize the properties of congruence’s. BTL2 Understanding
8 State the five modes of operation of block cipher? BTL2 Understanding
9 Explain the strength of triple DES. BTL2 Understanding
10 Explain S-DES Structure. BTL2 Understanding

11 What is triple encryption? How many keys are used in triple encryption? BTL1 Applying
12 Show general design of S-AES encryption cipher BTL1 Remembering
13 Identify Data units used in AES. BTL3 Analyzing
7
14 Find 11 mod 13. BTL4 Applying
15 Compare DES and AES. BTL4 Analyzing
List the parameters (block size, key size and no. of rounds) for the three
16 BTL4 Analyzing
AES versions.
17 Explain idea of RC4 stream cipher. BTL5 Evaluating
18 Explain Flat Multiple KDCs. BTL5 Evaluating
19 Discuss Key-Distribution Center. BTL6 Creating
20 Explain Hierarchical Multiple KDCs. BTL6 Creating
PART – B
1 Describe Modulo Arithmetic operations and properties in detail. (13) BTL1 Remembering
(i) Describe in detail the key generation in AES algorithm and its
2 expansion format (7) BTL1 Remembering
(ii) Describe Triple DES and its applications. (6)
3 Describe AES algorithm with all its round functions in detail. (13) BTL1 Remembering
4 Describe DES algorithm with neat diagram and explain the steps. (13) BTL1 Remembering
Solve gcd(98, 56) using Extended Euclidean algorithm. Write the
5 BTL2 Understanding
algorithm also (13)
6 Discuss the following in detail
(i) Modular Exponentiation (7) BTL2 Understanding
(ii) Finite fields (6)
Download updated materials from Rejinpaul Network App
www.rejinpaul.com
7 Explain the DES and General structure of DES with diagrams. (13) BTL2 Understanding
Identify the purpose of Differential and linear cryptanalysis and explain
8 BTL3 Applying
with neat diagram. (13)
For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function (4)
9 BTL3 Applying
ii) f function (3)
iii) Permutation p (3)
iv) Swapping of halves of the block. (3)
Explain the following modes of operation in block cipher.
10 (i) Electronic code book and Cipher block chaining. (7) BTL4 Analyzing
(ii) Cipher feedback mode and output feedback mode. (6)
(i) How Meet in the middle attack is performed on double Data
encryption Standard? (7)
11 BTL4 Analyzing
(ii) Explain the substitution bytes transformation and add round key
transformation of AES cipher. (6)
Discuss the properties that are to be satisfied by Groups, Rings and Fields.
12 BTL4 Analyzing
(13)
Explain about Block cipher design principles – Block cipher mode of
13 BTL5 Evaluating
operation. (13)
14 Discuss about Public Key distribution and Symmetric-Key Distribution.(13) BTL6 Creating
PART C
What do you mean by AES? Diagrammatically illustrate the structure of
1. BTL6 Creating
AES and describe the steps in AES encryption process with example. (15)
Discuss Structure of Simplified DES (S-DES) and Cipher and
2. BTL6 Creating
Reverse Cipher. (15)
i) Explain Key-distribution center with all aspects with neat diagram. (10)
3. BTL5 Evaluating
ii) Find 1113 mod 53 using modular exponentiation (5)
4. Measure the Public key-distribution and Symmetric Key-Distribution.(15) BTL5 Evaluating

UNIT III - PUBLIC KEY CRYPTOGRAPHY


MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem –
Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution –
Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-
Elliptic curve cryptography.
PART – A
BT
Q.No Questions Competence
Level
1. Define Coprimes. BTL1 Remembering
2. Define Euler’s theorem. BTL1 Remembering
3. What is a primitive root of a number? BTL1 Remembering
4. State Fundamental Theorem of Arithmetic. BTL1 Remembering
5. Define Euler’s totient function. BTL1 Remembering
6. State Fermat’s little theorem. BTL1 Remembering
Assume n has 200 bits. Give the number of bit operations needed to run the
7. divisibility-test algorithm? BTL2 Understanding
8. Why is asymmetric cryptography bad for huge data? Specify the reason. BTL2 Understanding
Download updated materials from Rejinpaul Network App
www.rejinpaul.com
9. Compare public key and private key. BTL2 Understanding
10. Explain elliptic curve. BTL2 Understanding
Explain whether symmetric and asymmetric cryptographic algorithm need
11. BTL4 Analyzing
key exchange.
12. Give the applications of the public key cryptosystem BTL3 Applying
Using the properties of discrete logarithms, show how to solve the
13. BTL3 Applying
following congruence: x2 ≡ 36 (mod 77).
14. Illustrate the purpose of Diffie Hellman key exchange. BTL3 Applying
15. Explain Elliptic Curves over Real Numbers BTL4 Analyzing
16. Explain attacks of RSA cryptosystem BTL4 Analyzing
Perform encryption and decryption using RSA algorithm for the following.
17. p=7, q=11; e=17; m=8. BTL5 Evaluating
18. Prepare any one technique attacking in RSA. BTL5 Evaluating
Predict differences between Conventional Encryption and Public-Key
19. BTL6 Creating
Encryption.
20. Are strong primes necessary in RSA? BTL6 Creating

PART – B

i. Describe RSA algorithm (6)


1 ii.Perform encryption and decryption using RSA algorithm for the BTL1 Remembering
following: p=7 q=11, e=7, M=9. (7)
Prove the Following
(i). If p is a prime and a is a positive integer relatively prime to p, then
2 BTL1 Remembering
ap-1≡ 1(mod p) (7)
(ii). If p is a prime and a is a positive integer, then ap ≡ a (mod p). (6)
Prove the following
(i).If n and a are coprime, then aφ(n) ≡ 1 (mod n). (6)
3 (ii) Use Euler's Theorem to find a number a between 0 and 9 such that a is BTL1 Remembering
congruent to71000 modulo 10. (Note that this is the same as the last digit of
the decimal expansion of 71000.) (7)
With a neat sketch explain the Elliptic curve cryptography with an example.
4 BTL1 Remembering
(13)
Perform encryption and decryption using RSA algorithm for p=17,
5 BTL2 Understanding
q=11,e=7 m=88. (13)
(i) Discuss how discrete logarithm evaluated for a number? What is the
role of discrete log in the Diffie - Hellman key exchange in exchanging
6 the secret key among two users? (7) BTL2 Understanding
(ii) What are elliptic curves? And also discuss how the elliptic curves are
useful for Cryptography? (6)
7 Explain the Key generation, encryption, and decryption in ElGamal. (13) BTL2 Understanding
Find the secret key shared between user A and user B using Diffie-
8 Hellman algorithm for the following q=353; α (primitive root)=3, XA=45 BTL3 Applying
and XB=50 (13)
9 Experiment with Taxonomy of potential attacks on RSA. (13) BTL3 Applying
(i) Explain Chinese Remainder theorem and find X for the given set of
10 congruent equation using CRT (7)
BTL4 Analyzing
X ≡ 2 (mod 3) X ≡ 3 (mod 5) X ≡ 2 (mod 7)
(ii) State and Prove Fermat’s theorem. (6)
11 Examine Elliptic Curve Cryptography Simulating ElGamal. (13) BTL4 Analyzing
Download updated materials from Rejinpaul Network App
www.rejinpaul.com
Users A and B use the Diffie-Hellman key exchange technique, a
common prime q=11 and a primitive root alpha=7.
12 (i) If user A has private key XA=3.What is A’s public key YA? (5) BTL4 Analyzing
(ii)If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Summarize Chinese Remainder theorem and find X for the given set of
13 congruent equation using CRT . (13) BTL5 Evaluating
X ≡ 1 (mod 5) X ≡ 2 (mod 7) X ≡ 3 (mod 9) X ≡ 4(mod 11)
(i) Discuss the Diffie-Hellman key exchange algorithm with its merits and
14 demerits. (7) BTL6 Applying
(i) Explain public key cryptography and when it is preferred. (6)
PART C
Users Alice and Bob use the Diffie-Hellman key exchange technique with
a common prime q = 83 and a primitive root α = 5.
1. i) If Alice has a private key XA = 6, what is Alice’s public key YA? (6) BTL6 Creating
ii) If Bob has a private key XB = 10, what is Bob’s public key YB? (6)
iii) Construct the shared secret key (3)
State and prove the Chinese remainder theorem. What are the last two
2. BTL6 Creating
digits of 4919? (15)
i) In a public-key system using RSA, you intercept the cipher text C = 10
sent to a user whose public key is e = 5, n = 35. What is the plaintext M? (8)
3. BTL5 Evaluating
ii) In an RSA system, the public key of a given user is e = 31, n = 3599.
Determine the private key of this user? (7)
4. Discuss the ElGamal cryptosystem and elliptic curve cryptosystem (15) BTL5 Evaluating

UNIT IV - MESSAGE AUTHENTICATION AND INTEGRITY


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication:
Biometrics, Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509
PART – A
BT
Q.No Questions Competence
Level
1. State any three requirements for authentication. BTL1 Remembering
2. Point out the properties a digital signature. BTL4 Analyzing
3. What is the role of compression function in hash function? BTL1 Remembering
4. Define the term message digest. BTL1 Remembering
5. Define the classes of message authentication function. BTL1 Remembering
6. List the authentication message requirements. BTL1 Remembering
7. How is the security of a MAC function expressed? BTL2 Understanding
8. Identify the requirements for message authentication. BTL3 Applying
9. Give the two approaches of digital signature. BTL2 Understanding
Explain the significance of signature function in Digital Signature
10. BTL2 Understanding
Standard (DSS) approach.
11. Identify the security services provided by digital signature. BTL3 Applying
12. How digital signatures differ from authentication protocols? BTL2 Applying
13. How do you specify various types of authentication protocol? BTL1 Remembering
14. Download updated
Explain the purpose of X.509materials
standard. from Rejinpaul Network App Analyzing
BTL4
www.rejinpaul.com
15. What is Kerberos? Point out its uses. BTL4 Analyzing
16. Identify 4 requirements defined by Kerberos. BTL3 Understanding
17. Summarize the Classes of message authentication function. BTL5 Evaluating
Assume a client C wants to communicate with a server S using Kerberos
18. BTL5 Evaluating
protocol. Explain How can it be achieved?
19. Create a simple authentication dialogue used in Kerberos. BTL6 Creating
Design the role of Ticket Granting Server in inters realm operations of
20. BTL6 Creating
Kerberos.
PART – B
(i)Where hash functions are used? What characteristics are needed in
secure hash function? Write about the security of hash functions and
1 BTL1 Remembering
MACs. (7)
(ii)Discuss the classification of authentication function in detail. (6)
Describe digital signature algorithm and show how signing and
2 BTL1 Remembering
Verification is done using DSS. (13)
3 Describe SHA2 in detail with neat diagram. (13) BTL1 Remembering
What is Digital Signature? Explain how it is created at the sender end and
4 retrieved at receiver end .differentiate digital signature from digital BTL1 Remembering
certificate. (13)
How Hash function algorithm is designed? Explain their features and
5 BTL2 Understanding
properties. (13)
i) Explain in detail message authentication code and its requirements. (7)
6 BTL2 Understanding
ii)Illustrate the security of hash functions and MACs . (6)
7 Describe Challenge-Response protocols in detail. (13) BTL2 Understanding
8 Explain the different approaches to message authentication (13) BTL5 Evaluating
Illustrate the steps involved in Signature generation and Verification
9 BTL3 Applying
functions of DSS. (13)
10 Explain in detail about X.509 authentication services. (13) BTL4 Analyzing
Explain Client Server Mutual authentication with example flow
11 Analyzing
diagram. (13) BTL4
i)What is Kerberos? Explain how it provides authenticated Services. (7)
12 BTL4 Analyzing
ii)Explain the format of the X.509 certificate. (6)
Discuss the roles of the different servers in Kerberos protocol. How does
13 BTL6 Creating
the user get authenticated to the different servers? (13)
Explain briefly about the architecture and certification mechanisms in
14 BTL3 Applying
Kerberos and X.509. (13)
PART C
With a neat diagram, explain the steps involved in SHA algorithm for
1 encrypting a message with maximum length of less than 2128 bits and BTL5 Evaluating
produces as output a 512-bit message digest. (15)
Create the process of deriving eighty 64-bit words from 1024 bits for
2 processing Of a single blocks and also discuss single round function in BTL6 Evaluating
SHA-512 algorithm. Show the values of W16, W17, W18 and W19. (15)
(i) Enumerate the properties of Hash Function. (8)
3. (ii) Evaluate the authentication protocol and list its limitations, how the BTL5 Creating
limitations overcome. (7)
(i)Elaborate the way how the limitations of Kerberos version 4 is overcome
4. in the environmental shortcomings and technical deficiencies. (8)
(ii) Elaborate how the encryption is key generated from password in BTL6 Creating
Kerberos. (7)

Download updated materials from Rejinpaul Network App


www.rejinpaul.com
UNIT V - SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders –
Malicious software – viruses – Firewalls
PART – A
BT
Q.No Questions Competence
Level
1. Define S/MIME. BTL1 Remembering
2. Expand and define SPI. BTL1 Remembering
3. Identify the steps involved in SET Transactions. BTL1 Remembering
4. Define SET? What are the features of SET? BTL1 Remembering
5. Identify the benefits of IPSecurity. BTL1 Remembering
6. Identify the five header fields defined in MIME. BTL1 Remembering
7. How can the signed data entity of S/MIME be prepared? Give the steps. BTL2 Understanding
8. Differentiate transport and tunnel mode in IPsec. BTL2 Understanding
9. Point out the services provided by PGP? BTL5 Evaluating
10. Explain the protocols used to provide IP security. BTL2 Understanding
11. What is a virus in a computer? Classify the types of viruses. BTL3 Applying
12. What are the various types of firewall and its design goal? BTL3 Applying
13. Identify the three classes of Intruders. BTL3 Applying
14. What is a Threat? List their types. BTL4 Analyzing
15. State the difference between threats and attacks. BTL4 Analyzing
16. Differentiate spyware and virus. BTL4 Analyzing
17. Give the advantages of intrusion detection system over firewall. BTL2 Understanding
18. Show the design goals of firewalls. BTL6 Evaluating
19. Discriminate statistical anomaly detection and rule based detection BTL5 Creating
20. Does the firewall ensure 100% security to the system? Comment. BTL6 Creating
PART-B
1 Describe the working of SET with neat diagram. (13) BTL1 Remembering
2 Describe in detail about SSL/TLS. (13) BTL1 Remembering
Explain the architecture of IPsec in detail in detail with a neat block
3 BTL2 Understanding
diagram. (13)
4 Describe in detail about S/MIME. (13) BTL1 Remembering
Discuss authentication header and ESP in detail with their packet format.
5
(13) BTL2 Understanding
Describe PGP cryptographic functions in detail with suitable block
6 BTL1 Remembering
diagrams. (13)
(i) Discuss transport mode and tunnel mode authentication in IP? Describe
how ESP is applied to both these modes. (7)
7 BTL2 Understanding
(ii)Draw the IP security authentication header and describe the functions
of each field. (6)
8 Explain the operational description of PGP. (13) BTL4 Creating
Illustrate the working principle of SET relate EST for Ecommerce
9 BTL3 Applying
Download
applications. updated materials from Rejinpaul Network (13) App
www.rejinpaul.com
Explain how firewalls help in the establishing a security framework for an
10 BTL4 Analyzing
organization. (13)
(i) Generalize the role of intrusion detection system? Point out the three
benefits that can be provided by the intrusion detection system? (7)
11 BTL6 Analyzing
(ii) Prepare comparison details between statistical anomaly detection and
rule based intrusion detection system? (6)
Explain the different types of virus in detail. Suggest scenarios for
12 BTL4 Analyzing
deploying these types in network scenario. (13)
Explain intrusion detection system (IDS) in detail with suitable diagrams.
13 BTL5 Evaluating
(13)
14 Illustrate the various types of firewalls with neat diagrams. (13) BTL3 Applying
PART C
1. Evaluate the performance of PGP. Compare it with S/MIME. (15) BTL5 Creating
(i) Write the steps involved in the simplified form of the SSL / TLS
protocol. (8)
2. BTL6 Creating
(ii) Generalize the methodology involved in computing the keys in SSL /
TLS protocol. (7)
(i) Explain the various measures that may be used for intrusion detection.
(8)
3. BTL5 Evaluating
(ii) Explain the various roles of firewalls and related terminology in detail.
(7)
Elaborate how secure electronic transaction (SET) protocol enables e-
4. BTL6 Evaluating
transactions. Explain the components involved. (15)

Download updated materials from Rejinpaul Network App

You might also like