CS6701-CRYPTOGRAPHY AND NETWORK SECURITY-155151822-Unit - 2 Two Marks CNS
CS6701-CRYPTOGRAPHY AND NETWORK SECURITY-155151822-Unit - 2 Two Marks CNS
4. Compare stream cipher with block cipher with example. (APRIL/MAY 2015)
Stream cipher: Processes the input stream continuously and producing one
element at a time. Example: caeser cipher.
Block cipher: Processes the input one block of elements at a time producing an
output block for each input block. Example: DES.
5. What is meant by padding in Block Cipher?
The process of adding bits to the last block are referred to as padding.Too much padding
makes the system inefficient.
The same algorithm with the same One algorithm is used for
key is used for encryption and encryption and decryption with a
decryption. pair of keys, one for encryption
The sender and receiver must share and another for decryption.
the algorithm and the key. the sender and receiver must each
The key must be secret have one of the matched pair of
It must be impossible or atleast keys. One of two keys must be
impractial message if no other kept Secret .
information is available It must be impossible or to at
Knowledge of the algorithm plus least impractical to decipher a
samples of cipher text must message if no other information
insufficient to determine the key is available.
Knowledge of the algorithm plus
one of key plus samples of
ciphertext must be insufficient to
determine the other key.
8. Mention the features of AES. (NOV/DEC 2011)
The features of AES are as follows −
Symmetric key symmetric block cipher
128-bit data, 128/192/256-bit keys
Stronger and faster than Triple-DES
Provide full specification and design details
Software implementable in C and Java
RSA ElGamal
For a particular security level, For the same level of security, very short
lengthy keys are required in RSA. keys are required.
It is widely accepted and used. It is new and not very popular in market.
19. Perform encryption and decryption using the RSA algorithm, for the following:
p = 3; q = 11, e = 7; M = 5
n = p x q = 3 x 11 = 33
j(n) = (p-1) x (q-1) = 2 x 10 = 20
gcd(j(n), e) = gcd(20, 7) = 1
∵ d ≡ e-1(mod j(n))
d x e mod j(n) = 1
7d mod 20 = 1
∴ d=3
So: Public Key pu = {e, n} = {7, 33}
Private Key pr = {d, n} = {3, 33}
Encryption:
C = Me mod n = 57 mod 33 = 14
Decryption:
M = Cd mod n = 143 mod 33 = 5
22. If a bit error occurs in the transmission of a ciphertext character in 8-bit CFB mode,
how far does the error propagate?
Nine plaintext characters are affected. The plaintext character corresponding to the cipher
text character is obviously altered. In addition, the altered cipher text character enters the
shift register and is not removed until the next eight characters are processed.
23. Why is the middle portion of 3DES a decryption rather than an encryption?
There is no cryptographic significance to the use of decryption for the second stage. Its
only advantage is that it allows users of 3DES to decrypt data encrypted by users of the
older single DES by repeating the key.
PART-B
1. Explain data encryption standard in detail?(APRIL/MAY 2015)( MAY/JUNE 2013)
MAY/JUNE 2014)(NOV/DEC 2012)
2. Explain the RSA algorithm in detail. For the given values, trace the sequence of
calculations in RSA, p=7,q=13,e=5 and M=10. (APRIL/MAY 2015)
3. Explain about the single round of DES algorithm. (APRIL/MAY 2011)
4. Describe key discarding process of DES. (APRIL/MAY 2011)
5. Explain RSA method in detail. (APRIL/MAY 2011)( MAY/JUNE 2013) MAY/JUNE
2014) (NOV/DEC 2011) (NOV/DEC 2012) (NOV/DEC 2013)
6. Explain about triple DES with an example?(MAY/JUNE 2012)(NOV/DEC 2013)
7. Explain about Diffie Hellman key exchange algorithm with one suitable example.
MAY/JUNE 2013) (MAY/JUNE 2014) (NOV/DEC 2012)
8. Demonstrate encryption and decryption for the RSA algorithm parameters p=3, q=11,
e=7, d=? , M=5. (MAY/JUNE 2014)
9. Users A and B use the Diffie Hellman Key exchange technique with a common prime
q=71 and a primitive root α=7. If user A has private key X A=5, what is A’s public key
YA? (MAY/JUNE 2014)
10. Explain the Key Generation, Encryption and Decryption of SDES algorithm in detail?
(NOV/DEC 2011)
11. Describe the mathematical foundations of RSA algorithm. Perform encryption and
decryption for the following p=17,q=7,e=5,n=119,message=”6”.Use Extended Euclid’s
algorithm to find the private key.(NOV/DEC 2014)
12. Consider a Diffie-Hellman scheme with a common prime q=353 and a primitive root
α=3. Users A and B have private keys X A=17,XB=21 respectively. what is the shared
secret key K1 and K2? (NOV/DEC 2014)