CNS QB
CNS QB
QUESTION BANK
Unit-I
Part-A (2 Marks)
Unit-II
Part-A (2 Marks)
1. How many keys are required for two people to communicate via a cipher?
2. What are the two approaches to attacking a cipher?
3. Compare Substitution and Transposition techniques..
4. Compare stream cipher and block cipher with example.
5. List the properties of Euler’s phi.
6. What is the difference between diffusion and confusion?
7. What is the advantage and disadvantage of one time pad encryption algorithm?
8. List the properties of Congruence’s.
9. Find gcd (56, 86) using Euclid’s algorithm.
10. What is the purpose of the Sub Bytes?
11. What is the difference between Sub Bytes and Sub Word?
12. What is the purpose of the S-boxes in DES?
13. What primitive operation is used in RC4?
PART B
1.(i) Briefly explain the design principles of block cipher. (8) (ii) Discuss in detail block
cipher modes of operation. (8)
2. a) Prove the Following
(i). If p is a prime and a is a positive integer relatively prime to p, then
a p-1 ≡ 1(mod p)
(ii). If p is a prime and a is a positive integer, then a p ≡ a (mod p)
3. Draw the general structure of DES and explain the encryption decryption process.
4. (i) Explain the generation sub key and S Box from the given 32-bit key by
Blowfish. (8)
(ii) In AES, hoe the encryption key is expanded to produce keys for the 10 rounds(8)
5. (i) Describe about RC4 algorithm. (8)
(ii) Explain the Miller-Rabin Algorithm . (8)
Unit-III
Part-A (2 Marks)
PART B
1.(i) Compare the Features of SHA-1 and MD5 algorithm. (8)
(ii) Discuss about the objectives of HMAC and it security features. (8)
2. Discuss clearly Secure Hash Algorithm(SHA) (8)
3. Describe the MD5 message digest algorithm with necessary block diagrams. (16)
4. Explain the authentication services provided by Kerberos.
5. Identify the requirements of Message Authentication Code. Explain the security of hash
function and MAC.(16)
6. Construct the process of deriving eighty 64-bit words from 1024 bits for
processing of a single blocks and also discuss single round function in SHA-
512 algorithm. Show the values of W16, W17, W18 and W32.(16)
Unit-V
Part-A (2 Marks)