Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Date of display: 17/2/2023

Date of submission: 23/2/2023

Assignment No: 1

Subject: Cryptography and System Security

Semester: VI Class: T.E


Batch Sr.No Questions Bloom's Course
wise/ . Taxonomy Outcome
Roll No. Level s

A1- 1 What is a OSI model? List a few security Understanding CSC602.1


Commo services and mechanisms for each layer.
n

A2- 2 Explain the terms Assets, controls, threats, Understanding CSC602.1


Commo vulnerabilities, risk and exposure with
n examples.
A3- 3 Enlist security goals. Discuss their Understanding CSC602.1
Commo significance
n
A1- 4 Discuss the idea of algorithm modes with Understanding CSC602.2
Commo detailed explanation of at least two of
n them.
A2- 5 Explain how fiestel cipher is used in Understanding CSC602.2
Commo structure of DES.
n
A3- 6 Explain the main concepts in DES Understanding CSC602.2
Commo
n
B1- 7 Explain Stream Cipher RC4 Understanding CSC602.2
Commo
n
B2- 8 Explain knapsack cryptosystem Understanding CSC602.2
Commo
n
B3- 9 Explain Needham Shroeder authentication Understanding CSC602.2
Commo protocol.
n
A1-B1- 10 Two users wish to establish a secure Applying CSC602.2
Commo communication channel and exchange a
n session key after mutual authentication.
show how this can be done with the help of
a KDC.
A2-B2- 11 Explain working of RSA algorithm. Which Understanding CSC602.2
Commo are possible attacks on RSA algorithm.
n
A3-B3- 12 How man-in-middle attack works in Understanding CSC602.2
Commo Diffie-Hellman key exchange algoritm.
n
A1-B1- 13 SHA provides better security than Message Analyzing CSC602.3
Commo Digest.Justify
n
A2-B2- 14 What are the requirements of message Understanding CSC602.3
Commo digests?
n
A3-B3- 15 What is the difference between MAC and Analyzing CSC602.3
Commo Message digest
n
A1- 16 Compare and contrast HMAC and CMAC. Analyzing CSC602.6
Commo
n
A2- 17 Show how a Kerberos protocol can be Analyzing CSC602.6
Commo usedto achieve single sign-on in distributed
n systems
A3- 18 What is the significance of a digital Analyzing CSC602.6
Commo signature on a certificate? Justify.
n
B1- 19 Compare Digital certificate with Digital Analyzing CSC602.6
Commo Signature.
n
B2- 20 What is PKI? Explain different PKI Understanding CSC602.6
Commo architectures in detail.
n
B3- 21 Write a short note on collision in hashing. Analyzing CSC602.6
Commo Which hashing algorithm wouldyou
n suggest using today and why?
45 List four kinds of cryptanalysis attacks and Understanding CSC602.2
explain.
What are the difference between mono-
alphabetic and poly – alphabetic?
49 Are all stream ciphers monoalphabetic? Understanding CSC602.2
Explain.
Briefly describe the hill cipher. It a
chosen plain text attack can be mounted.
It is easier to solve hill ciphers. Describe
such attack.
46 Are all block ciphers polyalphabetic? Understanding CSC602.2
Explain.
What is a transpose cipher? Illustrate an
example. What is steganography?
4 Alice can use only additive cipher on her Applying CSC602.2
computer t send a message to a friend. She
thinks that message is more secure if she
encrypts the message two times, each time
with different key. Is she right? Defend
your answer.
Solve with the hill cipher.
Plain text: “POH”
9 Encrypt the message “the house is being Applying CSC602.2
sold tonight” using one of the following
ciphers. Decrypt message to get plaintext.
Apply Vigenere cipher with key= dollars.
What is public key cryptography ? What is
the role of the session key in public key
scheme?
8,47 Encrypt the message “the house is being Applying CSC602.2
sold tonight” using one of the following
ciphers. Decrypt message to get plaintext.
Apply Autokey cipher with key= 7.
Write the difference between public key,
private Key, secret, shared key.
44,7 Encrypt the message “the house is being Applying CSC602.2
sold tonight” using one of the following
ciphers. Decrypt message to get plaintext.
Apply Playfair cipher keyword= playfair
example.
Explain RSA algorithm and find the
private key of a user, if his public key e=21
and n=3599? In RSA scheme is an official
standard today?
48,6 Use the Vigenere cipher with keyword Applying CSC602.2
“Health” to encipher the message “Life is
full of surprises”.
In a Diffie- Hellman key exchange
algorithm, let the prime number be 353 and
one of its primitive root be 3 and let A and
B select their secret key. XA=97and
XB=233.Compute the public key of A and
B and common secret key.
3,50 Given the key “Monarchy” applyplayfair CSC602.2
cipher to plaintext “FACTIONALISM”. Applying
Decrypt cipher text also.
Find the all primitive root of number ‘25’.
1,51 The encryption key in transposition cipher Applying CSC602.2
is (3,2,6,1,5,4). Find the decryption key.
Describe the security of RSA.
11 Alice can use only additive cipher on her Applying CSC602.2
computer t send a message to a friend. She
thinks that message is more secure if she
encrypts the message two times, each time
with different key. Is she right? Defend
your answer.
Solve with the hill cipher.
Plain text: “POH”
2 What is the output of plain text “Hello Applying CSC602.2
there my name is Atul” if we use Caesar
cipher to encode it?
5 What is the output of plain text “Hello Applying CSC602.2
there my name is Atul” if we use Caesar
cipher to encode it?
10 Assume a plain text “security is important Applying CSC602.2
and generate the corresponding cipher text
using Rail Fence technique.
12 Alice meets Bb and says Applying CSC602.2
“rjjyrjtsymjxfggfymbjbnqqinxhzxxymjuqfs
”. If she is using Caesar cipher, what des
she want t convey?
13 What would be transformation of message Applying CSC602.2
“Happy birth day to you” using Rail Fence
technique?
14 Consider the scheme involving Applying CSC602.2
replacement alphabets as follows,
Original A B
C .... X Y Z
Changed to Z Y
X .... C B A
15 Encrypt the message “This is a book on Applying CSC602.2
security” using monoalphabetic
substitution cipher with key=4.
16 Find out examples of security attacks Understanding CSC602.1
reported in last few years.
17 Discuss the reason behind the significance Understanding CSC602.1
of authentication.
18 In real life how is the message integrity Understanding CSC602.1
ensure?
19 Explain how cookies can be misused to Understanding CSC602.1
invade people’s privacy.
20 What is principle behind Trojan Horse? Understanding CSC602.1
21 What type of security mechanisms are Understanding CSC602.1
provided when a person signs a form he
has filled out to apply for credit card?
22 Find out which popular bank sites have Understanding, CSC602.1
been phished and how? Applying
23 Think about different phishing techniques. Analyzing CSC602.1
Which one of them would be most
effective and why?
24 Why Denial-of-Service attack (DOS) is Understanding CSC602.1
called passive?
25 Discuss conventional encryption model in Understanding CSC602.2
detail?
26 Solve with the hill cipher. Plain text: Applying CSC602.2
“POH” Key: GYBNQKURP
27 Give a real life example where both Understanding CSC602.2
confidentiality and integrity is needed.
Explain why encryption alone does not
provide integrity of information.
28 Explain RSA algorithm and find the Understanding, CSC602.2
private key of a user, if his public key e=21 Applying
and n=3599? In RSA scheme is an official
standard today?
52,29 In a Diffie- Hellman key exchange Applying CSC602.2
algorithm, let the prime number be 353 and
one of its primitive root be 3 and let A and
B select their secret key. XA=97and
XB=233.Compute the public key of A and
B and common secret key.
53,30 Describe the security of RSA. Understanding CSC602.2
33 Use Caesar’s Cipher to decipher the Applying CSC602.2
following
HQFUBSWHG WHAW?
34 Why Monoalphabetic ciphers are stronger Understanding CSC602.2
than Polyalphabetic ciphers?
35 Encrypt “thepepsiisintherefrigerator” using Applying CSC602.2
Vignere Cipher System using the keyword
“HUMOR”
36 Encrypt “cryptography” using Vignere Applying CSC602.2
Cipher System using the keyword
“LUCKY”
37 How is RSA used for authentication in Understanding CSC602.2
practice?
38 What do you understand by network Understanding CSC602.1
security attack? Describe active attack
and passive security attack.
54,39 Describe, In the brief fallowing security Understanding CSC602.1
services…
(a) Confidentiality.
(b) Traffic confidentiality.
(c) Access control.
(d) Data Integrity.
(e) Non-Repudiation.

55,40 Discuss conventional encryption model in Understanding CSC602.2


detail?
56,41 What are the essential ingredients of a Understanding CSC602.2
symmetric cipher? List two basic function
used in encryption algorithm.
42 Solve by playfair. Applying CSC602.2
Plain text = “I am not in the college”
43 Compose and contrast substitution Analyzing CSC602.2
technique with transposition technique
under classical encryption.

You might also like