0% found this document useful (0 votes)
24 views

CNS QB

Uploaded by

Suguna. M SNSCE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

CNS QB

Uploaded by

Suguna. M SNSCE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SNS COLLEGE OF ENGINEERING

Kurumbapalayam (Po), Coimbatore – 641 107


AN AUTONOMOUS INSTITUTION
Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai

QUESTION BANK
Unit-I
Part-A (2 Marks)

1. What are the types of attacks on encrypted message?


2. What is cryptanalysis and cryptography?
3. What are the key principles of security?
4. How does simple columnar transposition work?
5. What is avalanche effect?
6. Define threat and attack.
7. Give any four names of substitution techniques.
8. Specify the four categories of security threads.
9. Distinguish active and passive attack with example.
10. Compare stream cipher and block cipher with example.
11. How many keys are required for two people to communicate via a cipher?
12. What are the two approaches to attacking a cipher?
13. Compare Substitution and Transposition techniques.

Part-B (16 Marks)


1. (i) Discuss any four Substitution Technique and list their merits and demerits. (10)
(ii) Explain in detail Transposition Technique? (6)
2. Write short notes on
(i). Security attacks (8)
(ii). Security services. (8)
(iii) Security Mechanism (8)
3. Explain in detail about the OSI service architecture.(16)
4. Encrypt plaintext “wearediscoveredsaveyourself” with keyword “deceptive” using
vignere’s cipher.(16)
5.Convert “MEET ME” using Hill cipher with the key matrix
Convert the cipher text back to plaintext (8)

Unit-II
Part-A (2 Marks)

1. How many keys are required for two people to communicate via a cipher?
2. What are the two approaches to attacking a cipher?
3. Compare Substitution and Transposition techniques..
4. Compare stream cipher and block cipher with example.
5. List the properties of Euler’s phi.
6. What is the difference between diffusion and confusion?
7. What is the advantage and disadvantage of one time pad encryption algorithm?
8. List the properties of Congruence’s.
9. Find gcd (56, 86) using Euclid’s algorithm.
10. What is the purpose of the Sub Bytes?
11. What is the difference between Sub Bytes and Sub Word?
12. What is the purpose of the S-boxes in DES?
13. What primitive operation is used in RC4?
PART B
1.(i) Briefly explain the design principles of block cipher. (8) (ii) Discuss in detail block
cipher modes of operation. (8)
2. a) Prove the Following
(i). If p is a prime and a is a positive integer relatively prime to p, then
a p-1 ≡ 1(mod p)
(ii). If p is a prime and a is a positive integer, then a p ≡ a (mod p)
3. Draw the general structure of DES and explain the encryption decryption process.
4. (i) Explain the generation sub key and S Box from the given 32-bit key by
Blowfish. (8)
(ii) In AES, hoe the encryption key is expanded to produce keys for the 10 rounds(8)
5. (i) Describe about RC4 algorithm. (8)
(ii) Explain the Miller-Rabin Algorithm . (8)
Unit-III
Part-A (2 Marks)

1. Where the miller-robin algorithm is used?


2. Mention any one technique of attacking RSA.
3. List four general characteristics of schema for the distribution of the public key.
4. Define Coprime.
5. Why strong primes necessary in RSA?
6. Calculate the primitive roots of 11
7. Define Euler’s totient function or phi function and their applications.
8. Define Euler’s theorem and its application
9. Define Fermat Theorem
10. Define ECC.
PART B
1. Perform encryption and decryption using RSA Algorithm for the following.
P=7; q=11; e=17; M=8.
2. Write short notes on
(i)Fermat and Euler’s theorem (8)
(ii)Chinese Remainder theorem (8)
3. (i) Identify the possible threats for RSA algorithm and list their counter measures. (8)
(ii) Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7 and
N=5 (8)
4. (i) Describe about RC4 algorithm. (8)
(ii) Explain the Miller-Rabin Algorithm. (8)
5. Examine the RSA algorithm and perform encryption and decryption for p=17,
q=11,e=7 m=88.
6. Users A and B use the Diffie-Hellman key exchange technique, a common
Prime q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3.What is A’s public key YA? If user B
has private key XB=6. What is B’s public key YB?
(ii) What is the shared secret key?
Unit-IV
Part-A (2 Marks)

1. What are the properties a digital signature should have?


2. What is masquerading?
3. Define weak collision property of a hash function.
4. Why is SHA more secure than MD5?
5. Mention the fundamental idea of HMAC
6. Distinguish between direct and arbitrated digital signature?
7. What is Birthday attack?
What do you meant by hash function?
8. Differentiate MAC and Hash function.
9. List any three hash algorithm.
10. What are the requirements of the hash function?
11. What is the role of compression function in hash function?
12. What is X.509 Standard?
13. What is the role of Ticket Granting Server in inter realm operations of Kerberos?
14. Mention the scenario where Kerberos scheme is preferred.
15. What are the technical deficiencies in the Kerberos version 4 protocols?

PART B
1.(i) Compare the Features of SHA-1 and MD5 algorithm. (8)
(ii) Discuss about the objectives of HMAC and it security features. (8)
2. Discuss clearly Secure Hash Algorithm(SHA) (8)
3. Describe the MD5 message digest algorithm with necessary block diagrams. (16)
4. Explain the authentication services provided by Kerberos.
5. Identify the requirements of Message Authentication Code. Explain the security of hash
function and MAC.(16)
6. Construct the process of deriving eighty 64-bit words from 1024 bits for
processing of a single blocks and also discuss single round function in SHA-
512 algorithm. Show the values of W16, W17, W18 and W32.(16)
Unit-V
Part-A (2 Marks)

1. What are the services provided by PGP services?


2. What are the security options PGP allows when sending an email message?
3. How IPSec does offer the authentication and confidentiality services?
4. Why the leading two octets of message digest are stored in PGP message along with
encrypted message digest?
5. Define S/MIME. What are the key algorithms used in S/MIME?
6. What are the steps involved in SS L required protocol?
7. What is meant by SET? What are the features of SET?
8. What is meant by polymorphic viruses?
9. What are honey pots?
10 List down the four phases of virus.
11 What is IP address spoofing?
PART B
1. (i) Explain any two approaches for intrusion detection. (8) (i) Identify a few malicious
programs that need a host program for their existence.(8)
2. (i) Explain firewalls and how they prevent intrusions. (8) (ii)List and Brief, the
different generation of antivirus software (8)
3. (i) Define intrusion detection and the different types of detection mechanisms, in detail.
(8)
4. (i)Explain the types of Host based intrusion detection. List any two IDS software
available. (8)
(ii) What are the positive and negative effects of firewall? (8)
5. How does PGP provide confidentiality and authentication service for e-mail and file
storage applications? Draw the block diagram and explain its components. (16)
6.Write Short notes on S/MIME .
7. Explain the architecture of IP Security (16)

You might also like