Uploaded by tkndsimon

CS6701-Cryptography and Network Security

advertisement
www.vidyarthiplus.com
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur-603203
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year: 2016 -17
QUESTION BANK - ODD SEMESTER
NAME OF THE SUBJECT
SUBJECT CODE
SEMESTER
YEAR
DEPARTMENT
HANDLED & PREPARED BY
CRYPTOGRAPHY AND NETWORK SECURITY
CS6701
VII
IV
Information Technology
Mr.S.Sekar, A.P(Sr.G) & Mr.K.Elaiyaraja, A.P(Sr.G)
UNIT –I
PART-A
Q.No Question
Competence
Level
1
Differentiate between Active attacks and Passive Attacks
Understanding
BTL-2
2
Define Steganography
Remembering
BTL-1
3
State Eular‟s theorem.
Remembering
BTL-1
4
Define cryptanalysis.
Remembering
BTL-1
5
Compare Substitution and Transposition techniques.
Analysing
BTL-4
6
Why Random numbers are used in Network Security
Analysing
BTL-4
7
Classify the four categories of security threats
Analysing
BTL-4
8
Find 117 mod 13.
Applying
BTL-3
9
Define primitive root.
Remembering
BTL-1
10
What is traffic padding? What is its purpose?
Understanding
BTL-2
11
Define cryptography
Remembering
BTL-1
12
Why Modular arithmetic has been used in cryptography?
Evaluating
BTL-5
13
Compare Block and Stream cipher.
Understanding
BTL-2
14
Illustrate the two basic functions used in encryption algorithms.
Applying
BTL-3
15
Discuss: security mechanism.
Understanding
BTL-2
16
Decipher the following cipher Text using brute force attack:
CMTMROOEOORW (Hint: Algorithm-Rail fence)
Creating
BTL-6
17
Why network need security.
Applying
BTL-3
18
Give an example each for substitution and transposition ciphers
Understanding
BTL-2
19
Convert the Given Text “VALLIAMMAI” into cipher text using Rail fence
Technique.
Evaluating
BTL-5
20
Prepare the list of keys are required for two people to communicate via a cipher?
Creating
BTL-6
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 1 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
(i)State and Drive Fermat‟s theorem & Eular‟s theorem (8)
(ii)Explain the different security mechanisms focused by OSI security
architecture (8)
(i) Describe the substitution Techniques in detail (8)
2
(ii) Describe the Transposition Techniques in detail (8)
(i) What are the different types of attacks? Explain. (8)
3
(ii) State and explain Chinese remainder theorem with example. (8)
(i)
(i)Find 321 mod 11 using Fermat‟s theorem. (4)
4
(ii)Find GCD using Eular‟s Theorem with Example. (6)
(ii)Find GCD of 1070 and 1066 using Euclid algorithm. (6)
(i)Encrypt the message “PAY” using hill cipher with the following key matrix
and show the decryption to get original plain text.(8)
| 17 17 5 |
5
K= | 21 18 21 |
| 2 2 19 |
(ii)Explain classical encryption techniques with symmetric cipher model.(8)
Explain the following in detail
6
(i) Modular Exponentiation (8)
(ii) Finite fields (8)
(i)Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, knowing the message is
7
encrypted by Caesar cipher and k=5. Try to decrypt the message.
(8)
(ii)Using Vigenere cipher, encrypt the word “explanation” using the key leg. (8)
(i)Discuss briefly the Discrete Algorithms. (8)
8
(ii)Explain the following.
Groups, Rings and Field .
(8)
Differentiate between transposition cipher and substitution cipher. Apply two
9
stage transpositions Cipher on the “treat diagrams as single units” using the
keyword “sequence”.
(i)What is Steganography? Briefly explain any three techniques used. (8)
10
(ii)What is mono-alphabetic cipher? How it is different from Caesar cipher? (8)
(i) State the rules to perform encryption using playfair cipher and encrypt
„snowshooos‟ using „monarchy‟ I and J count as one letter and x is the filler
11
letter.(8)
(ii)Encrypt the word “Semester Result” with the keyword “Examination” using
playfair cipher.(8)
(i)With a neat block diagram, Generalize the network security model and the
important parameters associated with it.(8)
12
(ii)Distinguish between active and passive security attacks. Categorize these
attacks and explain one examples of each (8)
(i) (i) State and explain Chinese Remainder theorem. Using the same, find an
integer that has a remainder of 3 when divided by 7,4 when divided by 13 but
13
is divisible by 12. (8)
(ii) (ii) Discuss the Euclid‟s Algorithm. (8)
(i)Explain the following
a) Message Integrity (2)
b) Denial of Service (2)
14
c) Availability (2)
d) Authentication (2)
(ii)To find 1113 mod 53 using modular exponentiation. (8)
1
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Understanding
BTL-2
Remembering
BTL-1
Remembering
BTL-1
Evaluating
BTL-5
Creating
&
Analyzing
BTL-6
&
BTL-4
Understanding
BTL-2
Applying
BTL-3
Understanding
&
Understanding
BTL-2
Analyzing
BTL-4
Remembering
BTL-1
Applying
BTL-3
Creating
&
Analyzing
BTL-6
&
BTL-4
Analyzing
BTL-4
Remembering
BTL-1
Page 2 of 10
www.vidyarthiplus.com
UNIT –II
PART-A
Q.No Question
Competence
Level
1
Define RC5.
Remembering
BTL-1
2
What are the five modes of operation of block cipher?
Remembering
BTL-1
3
State whether symmetric and asymmetric cryptographic algorithm need key
exchange.
Analyzing
BTL-4
4
State few application of RC5 algorithm.
Understanding
BTL-2
5
What primitive operations are used in RC5?
Understanding
BTL-2
6
Why is the middle portion of triple DES a decryption rather than encryption?
Analyzing
BTL-4
7
What is avalanche effect?
Remembering
BTL-1
8
Is it possible to use the DES algorithm to generate message authentication code?
Justify.
Analyzing
BTL-4
9
Differentiate between sub bytes and sub words.
Applying
BTL-3
10
What is triple encryption? How many keys are used in triple encryption?
Understanding
BTL-2
11
Tell the applications of the public key crypto systems.
Remembering
BTL-1
12
Prepare any one technique attacking in RSA.
Creating
BTL-6
13
Differentiate public key and conventional encryption.
Applying
BTL-3
14
What is the purpose of Diffie Hellman key exchange?
Understanding
BTL-2
15
Name the principle elements of a public key crypto system?
Remembering
BTL-1
16
List four general characteristics of schema for the distribution of the public key.
Applying
BTL-3
Evaluating
BTL-5
Evaluating
BTL-5
17
18
What requirements must a public key crypto system to fulfil to a secured
algorithm?
Perform encryption and decryption using RSA algorithm for the following.
p=7, q=11; e=17; m=8
19
Are strong primes necessary in RSA?
Creating
BTL-6
20
What are the roles of public and private key?
Remembering
BTL-1
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 3 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
(i) Explain in detail, the key generation in AES algorithm and its expansion format.
(8)
(ii) Explain Triple DES and its applications.(8)
Describe the following modes of operation in block cipher.
(i) Electronic code book and Cipher block chaining. (8)
(ii) Cipher feedback mode and output feedback mode. (8)
(i) Explain about the single Round of DES algorithm. (10)
(ii) Describe the key discarding process of DES. (6)
(i) Explain the RC5 method used for encryption and decryption(8)
(ii) Explain Triple DES and its applications.(8)
(i)Draw the general structure of DES and explain how encryption and decryption are
carried out.(12)
(ii) Mention the strength of DES algorithm.(4)
(i)How meet in Meet in middle attack is performed on double Data Encryption
Standard.(8)
(ii)Explain the substitution bytes transformation and add round key transformation of
AES cipher(8)
(i) Explain how encryption is done using advanced encryption standard with
necessary diagram(8)
(ii)Explain in detail about Blowfish .(8)
Users A and B use the Diffie- Hellman key exchange technique, a common prime
q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3.What is A‟s public key YA?
(ii)If user B has private key XB=6. What is B‟s public key YB?
(iii) What is the shared secret key? Also write the algorithm.
(i) Explain RSA Algorithm.(8)
(ii)Demonstrate the encryption and decryption for the RSA algorithm parameters.
P=3, Q=11, E=7, d=?, M=5. (8)
(i) Discuss how discrete logarithm evaluated for a number? What is the role of
discrete log in the Diffie-Hellman key exchange in exchanging the secret key among
two users?(8)
(ii)What are elliptic curves? And also summarize how the elliptic curves are useful
for Cryptography?(8)
(i)Briefly explain the idea behind Elliptic Curve Cryptosystem.(8)
(ii)Explain the key management of public key encryption in detail.(8)
Describe the mathematical foundations of RSA algorithm. Perform encryption
decryption for the following.
P=17, q=7, e=5, n=119, message=”6”. Use Extended Euclid‟s algorithm to find the
private key.
(i) User A and B use Diffie-Hellman key exchange a common prime q=71 and a
primitive root a=7.
If user A has private key XA=5, What is A‟s public key YA
If user A has private key XB=12, What is B‟s public key YB and What is shared
secret key? (8)
(ii)Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6
with a modules of P=11. Determine all the points in E11 (1, 6). Start by calculation
the right hand side of the equation of all the values of n? (8)
(i)Explain briefly about Diffie-Hellman key exchange algorithm with its pros and
cons. (10)
(ii) What is public key cryptography and when is it preferred?(6)
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Remembering
BTL-1
Analyzing
BTL-4
Creating
BTL-6
Remembering
BTL-1
Remembering
BTL-1
Analyzing
BTL-4
Understandin
g
BTL-2
Evaluating
BTL-5
Understandin
g
BTL-2
Understandin
g
BTL-2
Remembering
BTL-1
Applying
BTL-2
Applying
BTL-3
Analyzing
BTL-4
Page 4 of 10
www.vidyarthiplus.com
UNIT –III
PART-A
Q.No
Question
Competence
Level
1
What are the requirements for message authentication?
Understanding
BTL-2
2
Define one way property in hash function?
Remembering
BTL-1
3
Distinguish between direct and arbitrated digital signature.
Analyzing
BTL-4
4
What is digital signature?
Remembering
BTL-1
5
What types of attacks are addressed by message authentication?
Creating
BTL-6
6
What are the properties a digital signature should have?
Remembering
BTL-1
7
What are the security services provided by digital signature?
Evaluating
BTL-5
8
Compare DSA and ElGamal algorithm.
Understanding
BTL-2
9
What you meant by MAC?
Remembering
BTL-1
10
What are the requirements of hash function?
Remembering
BTL-1
11
What is the block size of MD5?
Understanding
BTL-2
12
Differentiate MAC and hash function.
Analyzing
BTL-4
13
Differentiate between message authentication code and one way hash function.
Evaluating
BTL-5
14
Why is SHA more secure than MD5?
Applying
BTL-3
15
List any three hash algorithm.
Understanding
BTL-2
16
How digital signature is different from conventional? Give any two.
Creating
BTL-6
17
Define the classes of message authentication function.
Remembering
BTL-1
18
Compare MD5 and SHA algorithm.
Analyzing
BTL-4
19
List the authentication requirements.
Applying
BTL-3
20
What are the two approaches of digital signature?
Applying
BTL-3
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 5 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6
(i)Where hash functions are used? What characteristics are needed in secure hash
function? write about the security of hash functions and MACs.(8)
(ii)Examine Digital signature with ElGamal public key cryptosystem.(8)
Describe digital signature algorithm and show how signing and verification is
done using DSS.
Explain the process of deriving eighty 64-bit words from 1024 bits for processing
Of a single blocks and also discuss single round function in SHA-512 algorithm.
Show the values of W16, W17, W18 and W19.
What is Digital Signature? Explain how it is created at the sender end and
retrieved at receiver end .differentiate digital signature from digital certificate.
(i)Describe HMAC algorithm in detail.(8)
(ii)Explain the classification of authtication function in detail.(8)
(i)Compare the features of SHA and MD5 algorithm(8)
(ii)Discuss about the objectives of HMAC and its security features(8)
Competence
Level
Remembering
BTL-1
Remembering
BTL-1
Evaluating
BTL-5
Understanding
BTL-2
Understanding
BTL-2
Creating
BTL-6
7
How MD5 method provide security to the system?Explain with suitable diagram.
Analyzing
BTL-4
8
Explain in detail ElGamal Public key cryptosystems with an example.
Remembering
BTL-1
9
What is meant by message digest and explain about HMAC digital signatures
Remembering
BTL-1
10
(i)Describe Secure Hash Algorithm algorithm to generate message digest in
detail.(12)
(ii) Compare its performance with MD5.(4)
Applying
BTL-3
11
Write a brief notes on X.509 authentication services.
Understanding
BTL-2
Applying
BTL-3
Analyzing
BTL-4
Analyzing
BTL-4
12
13
14
(i) Illustrate the security of hash functions and MACs.(8)
(ii)Demonstrate any one method of efficient implementation of HMAC. (8)
(i) Explain in detail message authentication code and its requirements.(8)
(ii) With a neat flowchart, Explain MD5 processing of a single 512 bit block.(8)
(i)Enumerate the properties of Hash Function.(8)
(ii)Describe the authentication protocol and list its limitations, how the
limitations overcome.(8)
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 6 of 10
www.vidyarthiplus.com
UNIT – IV
PART-A
Q.No Question
Competence
Level
1
What are the Classes of message authentication function?
Evaluating
BTL-5
2
List the design goals of firewalls.
Analyzing
BTL-4
3
State the reasons to revoke a certificate before its expiry time.
Applying
BTL-3
4
Enlist commonly used firewalls from threats of security.
Analyzing
BTL-4
5
Define Worm.
Remembering
BTL-1
6
Differentiate spyware and virus.
Applying
BTL-3
7
Assume a client C wants to communicate with a server S using Kerberos
protocol .How can it be achieved?
Analyzing
BTL-4
8
What is intruder?
Applying
BTL-3
9
What are the advantages of intrusion detection system over firewall?
Remembering
BTL-1
10
Define: SET
Remembering
BTL-1
11
Define virus. Specify the types of viruses?
Understanding
BTL-2
12
Prepare a short note on application level gateway?
Creating
BTL-6
13
Define firewall.
Remembering
BTL-1
14
What is Kerberos? What are the uses?
Understanding
BTL-2
15
What do you mean by trusted systems?
Understanding
BTL-2
16
List 4 requirements were defined by Kerberos.
Remembering
BTL-1
17
List the 3 classes of Intruders.
Remembering
BTL-1
18
Does the firewall ensure 100% security to the system? Comment.
Evaluating
BTL-5
19
What is the role of Ticket Granting Server in inter realm operations of Kerberos?
Creating
BTL-6
20
What is the purpose of X.509 standard?
Understanding
BTL-2
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 7 of 10
www.vidyarthiplus.com
PART-B
Q.No Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Discuss elaborately how kerberos provides the different authentication services
with necessary diagrams.
(i) Explain the Firewall design principles.(8)
(ii) What are viruses? Explain the virus related threats and the counter measures
applied.(8)
Explain the various practical implementation of cryptography and security in
detail
(i) Explain the technical details of firewall. (8)
(ii)Illustrate the three common types of firewalls with diagrams. (8)
Explain in detail about Secure Electronic Transaction with neat diagram
(i)Discuss on the significant types of virus categories. (8)
(ii)What is a trusted system? Explain the basic concept of data access control in
trusted systems. (8)
(i) Explain briefly the architecture of distributed intrusion detection system with
the necessary diagrams. (8)
(ii) Explain about virus and related threats in detail. (8)
(i) Generalize the role of intrusion detection system? Point out the three benefits
that can be provided by the intrusion detection system? (8)
(ii) Prepare comparison details between statistical anomaly detection and rule
based intrusion detection system? (8)
(i)Explain the various roles of firewalls and related terminology in detail (8)
(ii)How does screened host architecture for firewalls differ from screened subnet
firewall architecture? Which offer more security for the information assets
remain on the trusted network? Explain with neat sketch?(8)
(i)Explain the roles of the different servers in Kerberos protocol. How does the
user get authenticated to the different servers?(8)
(ii)Explain briefly about trusted systems.(8)
(i) Classify the various measures that may be used for intrusion detection. (8)
(ii) Show How the encryption is key generated from password in Kerberos? (8)
(i)Explain with the help of an example how a user‟s certificate is obtained from
another certification authority in X.509 scheme. (8)
(ii)Describe the authentication dialog used by Kerberos for obtaining services
from another realm. (8)
(i)List out the participants of SET system, and explain in detail. (8)
(ii)Explain firewalls and how they prevent intrusions(8)
Describe the different types of firewalls and its configuration in detail
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Competence
Level
Understanding
BTL-2
Analyzing
BTL-4
Evaluating
BTL-5
Remembering
BTL-1
Remembering
BTL-1
Understanding
BTL-2
Analyzing
BTL-4
Analyzing
BTL-4
Analyzing
BTL-4
Understanding
BTL-2
Applying
BTL-3
Remembering
BTL-1
Applying
BTL-3
Remembering
BTL-1
Page 8 of 10
www.vidyarthiplus.com
UNIT – V
PART-A
Q.No Question
Competence
Level
1
What is dual signature? What it is purpose?
Understanding
BTL-2
2
What are the services provided by PGP?
Understanding
BTL-2
3
Define S/MIME.
Remembering
BTL-1
4
Draw the header format for an ISAKMP message.
Remembering
BTL-1
5
What are the protocols used to provide IP security?
Analyzing
BTL-4
6
Give the applications of IP Security.
Remembering
BTL-1
7
What is meant by SET? What are the features of SET?
Understanding
BTL-2
8
Why is R64 conversion useful for email generation?
Analyzing
BTL-4
9
What are the steps involved in SET Transactions?
Remembering
BTL-1
10
Why email compatibility function in PGP needed
Remembering
BTL-1
11
What is tunnel mode in IP security?
Understanding
BTL-2
12
What are the elements of MIME?
Remembering
BTL-1
13
Why does PGP generate a signature before Apply compression?
Creating
BTL-6
14
What services are provided by IPSec?
Applying
BTL-3
15
Expand and define SPI.
Understanding
BTL-2
16
How can the signed data entity of S/MIME be prepared? Write the steps
Applying
BTL-3
17
Differentiate between transport mode and tunnel mode.
Evaluating
BTL-5
18
What is the purpose of SSL alert protocol?
Remembering
BTL-1
19
Why does ESP include a padding field?
Applying
BTL-3
20
Give the reason for using PGP.
Understanding
BTL-2
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 9 of 10
www.vidyarthiplus.com
PART-B
Q.No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Question
(i) How does PGP provide authentication and confidentiality for email services
and for file transfer applications? Draw the block diagram and explain the
components. (8)
(ii) Explain the general format of PGP message. (8)
(i) Summarize the Operations of PGP? Brief the various services provided by
PGP. (8)
(ii) Discuss the threats faced by an e-mail and explain its security requirements
to provide a secure e-mail service.(8)
(i) Describe about the PKI. (8)
(ii) Describe the ISAKMP format with diagrams.(8)
(i) Summarize about the authentication header of IP.
(8)
(ii) Discuss about encapsulating security payload of IP
(8)
(i) List the different protocols of SSL. Explain in detail Handshake protocol.(8)
(ii) Tell how does the server get authenticated to client in SSL?(8)
Explain IPSec protocols in detail .Also develop applications and advantages of
IPSec.
(i) What is the importance of web security? Explain how secure socket layer
provides the reliable service.(8)
(ii) Briefly explain about Transport Level Security.(8)
(i) Sketch and analyze the IPSec Document Overview diagram.
(8)
(ii) Draw and explain PGP Cryptographic function for Authentication.
(8)
(i) What is PGP? Examine how authentication and confidentiality is maintained
in PGP. (8)
(ii) Explain the key rings and its significance in PGP. Show how the message
generation from sender to receiver and explain with suitable diagram. (8)
(i) Draw the IP security authentication header and describe the functions of each
field. (8)
(ii) What is transport mode and tunnel mode authentication in IP? Describe how
ESP is applied to both these modes? (8)
(i) What do you mean by Security Association? Illustrate the parameters that
identify the Security Association. (8)
(ii) What is a dual signature and what is its purpose? With neat block diagram
illustrate the Secure Electronic Transaction.(8)
(i) Differentiate between transport modes vs. tunnel mode encryption in
IPsec.(8)
(ii) With a neat diagram, Describe handshake protocol in SSL.(8)
(i) Analyze the Cryptographic algorithms used in S/MIME. (8)
(ii) Explain S/MIME certification processing. (8)
(i) Describe importance of RADIX-64 conversion. (8)
(ii) Describe IP security Architecture. (8)
Verified by
: 1.
[
3.
[
Forwarded by Year Coordinator
:
Approved by HOD
:
Competence
Level
Evaluating
BTL-5
Understanding
BTL-2
Remembering
BTL-1
Understanding
BTL-2
Remembering
BTL-1
Creating
BTL-6
Remembering
BTL-4
Analyzing
BTL-4
Applying
BTL-3
Remembering
BTL-1
Applying
BTL-3
Understanding
BTL-2
Analyzing
BTL-4
Remembering
BTL-1
]
2.
[
]
]
4.
[
]
***************
SS & KE / IT
CS6701- CNS
www.Vidyarthiplus.com
Page 10 of 10
Download