Unit1 QB

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

CB3491/ CRYPTOGRAPHY AND CYBER SECURITY

UNIT 1 INTRODUCTION TO SECURITY CONCEPTS

PART A

1. Define Cryptography.
2. Define cryptanalysis.
3. Define security attack, mechanisms, service.
4. Distinguish Threat and Attack.
5. Differentiate active attacks and passive attacks.
6. Specify the components of encryption algorithm.
7. Describe security mechanism.
8. Differentiate block and stream cipher
9. What is brute-force attack?
10. List the types of cryptanalysis attack.
11. Compare Substitution and Transposition techniques.
12. Define Steganography
13. What is meant by Denial of Service attack? Is it Active Attack or Passive Attack?
14. Let message = “Anna”, and k = 3, find the ciphertext using Caesar.
15. Encrypt the plaintext “tobeornottobe” using the vigenere cipher for the key value “Now”.
16. Specify the components of Encryption algorithm.
17. Define Masqurade.
18. Define Non-Repudiation.

PART B & PART CS

1. Let Message “GRADUATE’, key “WORD” Find cipher text using playfair cipher.
2. Encryption and Decryption process in hill cipher m=”sh” and key=”hill”.
3. Play fair cipher encrypt “SEMESTER RESULT” Keyword “EXAMINATION”
4. Using Playfair cipher encrypt the following messge “SWARAJ IS MY BIRTH RIGHT” Key
“MONARCHY”.
5. Define OSI Security Architecture (13)
6. Define Substitution and Transposition techniques (13)
7. Evaluate characteristics of modern cryptography and working principle.
8. Encrypt the message “PAY” using hill cipher with the following key matrix and show the
decryption to get original plain text. K = 17 17 5
21 18 21
2 2 19
9. Perform encryption and decryption using hill cipher for the following message “PEN” and
key: “ACTIVATED”

You might also like