www.vidyarthiplus.com VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur-603203 DEPARTMENT OF INFORMATION TECHNOLOGY Academic Year: 2016 -17 QUESTION BANK - ODD SEMESTER NAME OF THE SUBJECT SUBJECT CODE SEMESTER YEAR DEPARTMENT HANDLED & PREPARED BY CRYPTOGRAPHY AND NETWORK SECURITY CS6701 VII IV Information Technology Mr.S.Sekar, A.P(Sr.G) & Mr.K.Elaiyaraja, A.P(Sr.G) UNIT –I PART-A Q.No Question Competence Level 1 Differentiate between Active attacks and Passive Attacks Understanding BTL-2 2 Define Steganography Remembering BTL-1 3 State Eular‟s theorem. Remembering BTL-1 4 Define cryptanalysis. Remembering BTL-1 5 Compare Substitution and Transposition techniques. Analysing BTL-4 6 Why Random numbers are used in Network Security Analysing BTL-4 7 Classify the four categories of security threats Analysing BTL-4 8 Find 117 mod 13. Applying BTL-3 9 Define primitive root. Remembering BTL-1 10 What is traffic padding? What is its purpose? Understanding BTL-2 11 Define cryptography Remembering BTL-1 12 Why Modular arithmetic has been used in cryptography? Evaluating BTL-5 13 Compare Block and Stream cipher. Understanding BTL-2 14 Illustrate the two basic functions used in encryption algorithms. Applying BTL-3 15 Discuss: security mechanism. Understanding BTL-2 16 Decipher the following cipher Text using brute force attack: CMTMROOEOORW (Hint: Algorithm-Rail fence) Creating BTL-6 17 Why network need security. Applying BTL-3 18 Give an example each for substitution and transposition ciphers Understanding BTL-2 19 Convert the Given Text “VALLIAMMAI” into cipher text using Rail fence Technique. Evaluating BTL-5 20 Prepare the list of keys are required for two people to communicate via a cipher? Creating BTL-6 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 1 of 10 www.vidyarthiplus.com PART-B Q.No Question (i)State and Drive Fermat‟s theorem & Eular‟s theorem (8) (ii)Explain the different security mechanisms focused by OSI security architecture (8) (i) Describe the substitution Techniques in detail (8) 2 (ii) Describe the Transposition Techniques in detail (8) (i) What are the different types of attacks? Explain. (8) 3 (ii) State and explain Chinese remainder theorem with example. (8) (i) (i)Find 321 mod 11 using Fermat‟s theorem. (4) 4 (ii)Find GCD using Eular‟s Theorem with Example. (6) (ii)Find GCD of 1070 and 1066 using Euclid algorithm. (6) (i)Encrypt the message “PAY” using hill cipher with the following key matrix and show the decryption to get original plain text.(8) | 17 17 5 | 5 K= | 21 18 21 | | 2 2 19 | (ii)Explain classical encryption techniques with symmetric cipher model.(8) Explain the following in detail 6 (i) Modular Exponentiation (8) (ii) Finite fields (8) (i)Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, knowing the message is 7 encrypted by Caesar cipher and k=5. Try to decrypt the message. (8) (ii)Using Vigenere cipher, encrypt the word “explanation” using the key leg. (8) (i)Discuss briefly the Discrete Algorithms. (8) 8 (ii)Explain the following. Groups, Rings and Field . (8) Differentiate between transposition cipher and substitution cipher. Apply two 9 stage transpositions Cipher on the “treat diagrams as single units” using the keyword “sequence”. (i)What is Steganography? Briefly explain any three techniques used. (8) 10 (ii)What is mono-alphabetic cipher? How it is different from Caesar cipher? (8) (i) State the rules to perform encryption using playfair cipher and encrypt „snowshooos‟ using „monarchy‟ I and J count as one letter and x is the filler 11 letter.(8) (ii)Encrypt the word “Semester Result” with the keyword “Examination” using playfair cipher.(8) (i)With a neat block diagram, Generalize the network security model and the important parameters associated with it.(8) 12 (ii)Distinguish between active and passive security attacks. Categorize these attacks and explain one examples of each (8) (i) (i) State and explain Chinese Remainder theorem. Using the same, find an integer that has a remainder of 3 when divided by 7,4 when divided by 13 but 13 is divisible by 12. (8) (ii) (ii) Discuss the Euclid‟s Algorithm. (8) (i)Explain the following a) Message Integrity (2) b) Denial of Service (2) 14 c) Availability (2) d) Authentication (2) (ii)To find 1113 mod 53 using modular exponentiation. (8) 1 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Competence Level Understanding BTL-2 Remembering BTL-1 Remembering BTL-1 Evaluating BTL-5 Creating & Analyzing BTL-6 & BTL-4 Understanding BTL-2 Applying BTL-3 Understanding & Understanding BTL-2 Analyzing BTL-4 Remembering BTL-1 Applying BTL-3 Creating & Analyzing BTL-6 & BTL-4 Analyzing BTL-4 Remembering BTL-1 Page 2 of 10 www.vidyarthiplus.com UNIT –II PART-A Q.No Question Competence Level 1 Define RC5. Remembering BTL-1 2 What are the five modes of operation of block cipher? Remembering BTL-1 3 State whether symmetric and asymmetric cryptographic algorithm need key exchange. Analyzing BTL-4 4 State few application of RC5 algorithm. Understanding BTL-2 5 What primitive operations are used in RC5? Understanding BTL-2 6 Why is the middle portion of triple DES a decryption rather than encryption? Analyzing BTL-4 7 What is avalanche effect? Remembering BTL-1 8 Is it possible to use the DES algorithm to generate message authentication code? Justify. Analyzing BTL-4 9 Differentiate between sub bytes and sub words. Applying BTL-3 10 What is triple encryption? How many keys are used in triple encryption? Understanding BTL-2 11 Tell the applications of the public key crypto systems. Remembering BTL-1 12 Prepare any one technique attacking in RSA. Creating BTL-6 13 Differentiate public key and conventional encryption. Applying BTL-3 14 What is the purpose of Diffie Hellman key exchange? Understanding BTL-2 15 Name the principle elements of a public key crypto system? Remembering BTL-1 16 List four general characteristics of schema for the distribution of the public key. Applying BTL-3 Evaluating BTL-5 Evaluating BTL-5 17 18 What requirements must a public key crypto system to fulfil to a secured algorithm? Perform encryption and decryption using RSA algorithm for the following. p=7, q=11; e=17; m=8 19 Are strong primes necessary in RSA? Creating BTL-6 20 What are the roles of public and private key? Remembering BTL-1 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 3 of 10 www.vidyarthiplus.com PART-B Q.No Question 1 2 3 4 5 6 7 8 9 10 11 12 13 14 (i) Explain in detail, the key generation in AES algorithm and its expansion format. (8) (ii) Explain Triple DES and its applications.(8) Describe the following modes of operation in block cipher. (i) Electronic code book and Cipher block chaining. (8) (ii) Cipher feedback mode and output feedback mode. (8) (i) Explain about the single Round of DES algorithm. (10) (ii) Describe the key discarding process of DES. (6) (i) Explain the RC5 method used for encryption and decryption(8) (ii) Explain Triple DES and its applications.(8) (i)Draw the general structure of DES and explain how encryption and decryption are carried out.(12) (ii) Mention the strength of DES algorithm.(4) (i)How meet in Meet in middle attack is performed on double Data Encryption Standard.(8) (ii)Explain the substitution bytes transformation and add round key transformation of AES cipher(8) (i) Explain how encryption is done using advanced encryption standard with necessary diagram(8) (ii)Explain in detail about Blowfish .(8) Users A and B use the Diffie- Hellman key exchange technique, a common prime q=11 and a primitive root alpha=7. (i) If user A has private key XA=3.What is A‟s public key YA? (ii)If user B has private key XB=6. What is B‟s public key YB? (iii) What is the shared secret key? Also write the algorithm. (i) Explain RSA Algorithm.(8) (ii)Demonstrate the encryption and decryption for the RSA algorithm parameters. P=3, Q=11, E=7, d=?, M=5. (8) (i) Discuss how discrete logarithm evaluated for a number? What is the role of discrete log in the Diffie-Hellman key exchange in exchanging the secret key among two users?(8) (ii)What are elliptic curves? And also summarize how the elliptic curves are useful for Cryptography?(8) (i)Briefly explain the idea behind Elliptic Curve Cryptosystem.(8) (ii)Explain the key management of public key encryption in detail.(8) Describe the mathematical foundations of RSA algorithm. Perform encryption decryption for the following. P=17, q=7, e=5, n=119, message=”6”. Use Extended Euclid‟s algorithm to find the private key. (i) User A and B use Diffie-Hellman key exchange a common prime q=71 and a primitive root a=7. If user A has private key XA=5, What is A‟s public key YA If user A has private key XB=12, What is B‟s public key YB and What is shared secret key? (8) (ii)Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6 with a modules of P=11. Determine all the points in E11 (1, 6). Start by calculation the right hand side of the equation of all the values of n? (8) (i)Explain briefly about Diffie-Hellman key exchange algorithm with its pros and cons. (10) (ii) What is public key cryptography and when is it preferred?(6) SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Competence Level Remembering BTL-1 Analyzing BTL-4 Creating BTL-6 Remembering BTL-1 Remembering BTL-1 Analyzing BTL-4 Understandin g BTL-2 Evaluating BTL-5 Understandin g BTL-2 Understandin g BTL-2 Remembering BTL-1 Applying BTL-2 Applying BTL-3 Analyzing BTL-4 Page 4 of 10 www.vidyarthiplus.com UNIT –III PART-A Q.No Question Competence Level 1 What are the requirements for message authentication? Understanding BTL-2 2 Define one way property in hash function? Remembering BTL-1 3 Distinguish between direct and arbitrated digital signature. Analyzing BTL-4 4 What is digital signature? Remembering BTL-1 5 What types of attacks are addressed by message authentication? Creating BTL-6 6 What are the properties a digital signature should have? Remembering BTL-1 7 What are the security services provided by digital signature? Evaluating BTL-5 8 Compare DSA and ElGamal algorithm. Understanding BTL-2 9 What you meant by MAC? Remembering BTL-1 10 What are the requirements of hash function? Remembering BTL-1 11 What is the block size of MD5? Understanding BTL-2 12 Differentiate MAC and hash function. Analyzing BTL-4 13 Differentiate between message authentication code and one way hash function. Evaluating BTL-5 14 Why is SHA more secure than MD5? Applying BTL-3 15 List any three hash algorithm. Understanding BTL-2 16 How digital signature is different from conventional? Give any two. Creating BTL-6 17 Define the classes of message authentication function. Remembering BTL-1 18 Compare MD5 and SHA algorithm. Analyzing BTL-4 19 List the authentication requirements. Applying BTL-3 20 What are the two approaches of digital signature? Applying BTL-3 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 5 of 10 www.vidyarthiplus.com PART-B Q.No Question 1 2 3 4 5 6 (i)Where hash functions are used? What characteristics are needed in secure hash function? write about the security of hash functions and MACs.(8) (ii)Examine Digital signature with ElGamal public key cryptosystem.(8) Describe digital signature algorithm and show how signing and verification is done using DSS. Explain the process of deriving eighty 64-bit words from 1024 bits for processing Of a single blocks and also discuss single round function in SHA-512 algorithm. Show the values of W16, W17, W18 and W19. What is Digital Signature? Explain how it is created at the sender end and retrieved at receiver end .differentiate digital signature from digital certificate. (i)Describe HMAC algorithm in detail.(8) (ii)Explain the classification of authtication function in detail.(8) (i)Compare the features of SHA and MD5 algorithm(8) (ii)Discuss about the objectives of HMAC and its security features(8) Competence Level Remembering BTL-1 Remembering BTL-1 Evaluating BTL-5 Understanding BTL-2 Understanding BTL-2 Creating BTL-6 7 How MD5 method provide security to the system?Explain with suitable diagram. Analyzing BTL-4 8 Explain in detail ElGamal Public key cryptosystems with an example. Remembering BTL-1 9 What is meant by message digest and explain about HMAC digital signatures Remembering BTL-1 10 (i)Describe Secure Hash Algorithm algorithm to generate message digest in detail.(12) (ii) Compare its performance with MD5.(4) Applying BTL-3 11 Write a brief notes on X.509 authentication services. Understanding BTL-2 Applying BTL-3 Analyzing BTL-4 Analyzing BTL-4 12 13 14 (i) Illustrate the security of hash functions and MACs.(8) (ii)Demonstrate any one method of efficient implementation of HMAC. (8) (i) Explain in detail message authentication code and its requirements.(8) (ii) With a neat flowchart, Explain MD5 processing of a single 512 bit block.(8) (i)Enumerate the properties of Hash Function.(8) (ii)Describe the authentication protocol and list its limitations, how the limitations overcome.(8) SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 6 of 10 www.vidyarthiplus.com UNIT – IV PART-A Q.No Question Competence Level 1 What are the Classes of message authentication function? Evaluating BTL-5 2 List the design goals of firewalls. Analyzing BTL-4 3 State the reasons to revoke a certificate before its expiry time. Applying BTL-3 4 Enlist commonly used firewalls from threats of security. Analyzing BTL-4 5 Define Worm. Remembering BTL-1 6 Differentiate spyware and virus. Applying BTL-3 7 Assume a client C wants to communicate with a server S using Kerberos protocol .How can it be achieved? Analyzing BTL-4 8 What is intruder? Applying BTL-3 9 What are the advantages of intrusion detection system over firewall? Remembering BTL-1 10 Define: SET Remembering BTL-1 11 Define virus. Specify the types of viruses? Understanding BTL-2 12 Prepare a short note on application level gateway? Creating BTL-6 13 Define firewall. Remembering BTL-1 14 What is Kerberos? What are the uses? Understanding BTL-2 15 What do you mean by trusted systems? Understanding BTL-2 16 List 4 requirements were defined by Kerberos. Remembering BTL-1 17 List the 3 classes of Intruders. Remembering BTL-1 18 Does the firewall ensure 100% security to the system? Comment. Evaluating BTL-5 19 What is the role of Ticket Granting Server in inter realm operations of Kerberos? Creating BTL-6 20 What is the purpose of X.509 standard? Understanding BTL-2 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 7 of 10 www.vidyarthiplus.com PART-B Q.No Question 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Discuss elaborately how kerberos provides the different authentication services with necessary diagrams. (i) Explain the Firewall design principles.(8) (ii) What are viruses? Explain the virus related threats and the counter measures applied.(8) Explain the various practical implementation of cryptography and security in detail (i) Explain the technical details of firewall. (8) (ii)Illustrate the three common types of firewalls with diagrams. (8) Explain in detail about Secure Electronic Transaction with neat diagram (i)Discuss on the significant types of virus categories. (8) (ii)What is a trusted system? Explain the basic concept of data access control in trusted systems. (8) (i) Explain briefly the architecture of distributed intrusion detection system with the necessary diagrams. (8) (ii) Explain about virus and related threats in detail. (8) (i) Generalize the role of intrusion detection system? Point out the three benefits that can be provided by the intrusion detection system? (8) (ii) Prepare comparison details between statistical anomaly detection and rule based intrusion detection system? (8) (i)Explain the various roles of firewalls and related terminology in detail (8) (ii)How does screened host architecture for firewalls differ from screened subnet firewall architecture? Which offer more security for the information assets remain on the trusted network? Explain with neat sketch?(8) (i)Explain the roles of the different servers in Kerberos protocol. How does the user get authenticated to the different servers?(8) (ii)Explain briefly about trusted systems.(8) (i) Classify the various measures that may be used for intrusion detection. (8) (ii) Show How the encryption is key generated from password in Kerberos? (8) (i)Explain with the help of an example how a user‟s certificate is obtained from another certification authority in X.509 scheme. (8) (ii)Describe the authentication dialog used by Kerberos for obtaining services from another realm. (8) (i)List out the participants of SET system, and explain in detail. (8) (ii)Explain firewalls and how they prevent intrusions(8) Describe the different types of firewalls and its configuration in detail SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Competence Level Understanding BTL-2 Analyzing BTL-4 Evaluating BTL-5 Remembering BTL-1 Remembering BTL-1 Understanding BTL-2 Analyzing BTL-4 Analyzing BTL-4 Analyzing BTL-4 Understanding BTL-2 Applying BTL-3 Remembering BTL-1 Applying BTL-3 Remembering BTL-1 Page 8 of 10 www.vidyarthiplus.com UNIT – V PART-A Q.No Question Competence Level 1 What is dual signature? What it is purpose? Understanding BTL-2 2 What are the services provided by PGP? Understanding BTL-2 3 Define S/MIME. Remembering BTL-1 4 Draw the header format for an ISAKMP message. Remembering BTL-1 5 What are the protocols used to provide IP security? Analyzing BTL-4 6 Give the applications of IP Security. Remembering BTL-1 7 What is meant by SET? What are the features of SET? Understanding BTL-2 8 Why is R64 conversion useful for email generation? Analyzing BTL-4 9 What are the steps involved in SET Transactions? Remembering BTL-1 10 Why email compatibility function in PGP needed Remembering BTL-1 11 What is tunnel mode in IP security? Understanding BTL-2 12 What are the elements of MIME? Remembering BTL-1 13 Why does PGP generate a signature before Apply compression? Creating BTL-6 14 What services are provided by IPSec? Applying BTL-3 15 Expand and define SPI. Understanding BTL-2 16 How can the signed data entity of S/MIME be prepared? Write the steps Applying BTL-3 17 Differentiate between transport mode and tunnel mode. Evaluating BTL-5 18 What is the purpose of SSL alert protocol? Remembering BTL-1 19 Why does ESP include a padding field? Applying BTL-3 20 Give the reason for using PGP. Understanding BTL-2 SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 9 of 10 www.vidyarthiplus.com PART-B Q.No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Question (i) How does PGP provide authentication and confidentiality for email services and for file transfer applications? Draw the block diagram and explain the components. (8) (ii) Explain the general format of PGP message. (8) (i) Summarize the Operations of PGP? Brief the various services provided by PGP. (8) (ii) Discuss the threats faced by an e-mail and explain its security requirements to provide a secure e-mail service.(8) (i) Describe about the PKI. (8) (ii) Describe the ISAKMP format with diagrams.(8) (i) Summarize about the authentication header of IP. (8) (ii) Discuss about encapsulating security payload of IP (8) (i) List the different protocols of SSL. Explain in detail Handshake protocol.(8) (ii) Tell how does the server get authenticated to client in SSL?(8) Explain IPSec protocols in detail .Also develop applications and advantages of IPSec. (i) What is the importance of web security? Explain how secure socket layer provides the reliable service.(8) (ii) Briefly explain about Transport Level Security.(8) (i) Sketch and analyze the IPSec Document Overview diagram. (8) (ii) Draw and explain PGP Cryptographic function for Authentication. (8) (i) What is PGP? Examine how authentication and confidentiality is maintained in PGP. (8) (ii) Explain the key rings and its significance in PGP. Show how the message generation from sender to receiver and explain with suitable diagram. (8) (i) Draw the IP security authentication header and describe the functions of each field. (8) (ii) What is transport mode and tunnel mode authentication in IP? Describe how ESP is applied to both these modes? (8) (i) What do you mean by Security Association? Illustrate the parameters that identify the Security Association. (8) (ii) What is a dual signature and what is its purpose? With neat block diagram illustrate the Secure Electronic Transaction.(8) (i) Differentiate between transport modes vs. tunnel mode encryption in IPsec.(8) (ii) With a neat diagram, Describe handshake protocol in SSL.(8) (i) Analyze the Cryptographic algorithms used in S/MIME. (8) (ii) Explain S/MIME certification processing. (8) (i) Describe importance of RADIX-64 conversion. (8) (ii) Describe IP security Architecture. (8) Verified by : 1. [ 3. [ Forwarded by Year Coordinator : Approved by HOD : Competence Level Evaluating BTL-5 Understanding BTL-2 Remembering BTL-1 Understanding BTL-2 Remembering BTL-1 Creating BTL-6 Remembering BTL-4 Analyzing BTL-4 Applying BTL-3 Remembering BTL-1 Applying BTL-3 Understanding BTL-2 Analyzing BTL-4 Remembering BTL-1 ] 2. [ ] ] 4. [ ] *************** SS & KE / IT CS6701- CNS www.Vidyarthiplus.com Page 10 of 10