Cryptography and Networks Security Question Bank
Cryptography and Networks Security Question Bank
Cryptography and Networks Security Question Bank
UNIT-I
1. Explain OSI Security Architecture
2. List and define categories of security attacks and services
3. List and explain the security mechanisms
4. Draw a matrix that shows the relationship between security mechanisms and attacks
5. Define computer security. Give examples of recent computer security attacks which you
know
6. How would you test a piece of cipher text to determine quickly if it was likely the result of a
simple substation? Explain
7. List and difference between Cryptography and cryptanalysis with example
8. Explain Classical Encryption Techniques with any one of the encryption techniques examples
9. Explain Caesar Cipher with an example
10. Explain Monoalphabetic Ciphers with an example
11. Explain Playfair Cipher with an example
12. Explain Hill Cipher with an example
13. Explain Polyalphabetic Ciphers with an example
14. Explain Transposition Techniques with an example of rail fence technique
UNIT-II
UNIT-III
1. State Fermat’s little theorem. What is the importance of this theorem in RSA crypto system
2. Let p = 7, q = 11. Assume ‘e’, find ‘d’, Encrypt the message “Hello World” using RSA
algorithm
3. Define Euclidean algorithm. Write the pseudo code of the algorithm. Use this algorithm to
find the greatest common divisor of 2740 and 1760
4. Explain RSA algorithm with example
5. Describe the possible attacks on Diffie Hellman key exchange mechanism
6. Use Fermat's Theorem to find a number x 85between 0 and 28 with x 85 congruent to 6
modulo 29
7. List and explain the principles of public key cryptosystems
8. Perform encryption and decryption using the RSA algorithm for the following:
a. p = 3; q = 11, e = 7; M = 5
b. p = 5; q = 11, e = 3; M = 9
c. p = 7; q = 11, e = 17; M = 8
9. How keys are distributed in public key cryptographic algorithms?
10. Discuss the four possible approaches to attack the RSA algorithm
11. Explain Chinese Remainder Theorem
UNIT-IV
1. Explain the use of hash function for message authentication
2. What is the need for Digital Signatures? What are the properties and requirements for a digital
signature and difference between conventional signature and digital signature?
3. Distinguish between HMAC and CMAC
4. List the main features of the SHA-512 cryptographic hash function. What kind of
compression function is used in SHA-512?
5. Is it possible to use a hash function to construct a block cipher with a structure similar to
DES? Because a hash unction is one way and a block cipher must be reversible, how is it
possible?
6. Explain Message Authentication Requirements and What are the attacks related to message
communication?
7. List and describe the steps involved in processing of a message using SHA-512
8. Explain Authenticated Encryption: CCM, GCM
9. Explain requirements for Message Authentication Codes HMAC, DAA and CMAC
UNIT-V
1. Describe the trust management in X.509
2. Differentiate between SSL and TLS
3. What are the data types and subtypes in MIME? And also discuss the limitations of SMTP
4. Explain types of firewalls
5. Differentiate between the transport mode and tunnel mode of IP Sec and explain how
authentication and confidentiality are achieved using IP Sec
6. What are the two levels of alerts? What action is taken by SSL when a fatal level is received?
Explain
7. In S/MIME, explain how Bob and Alice exchange the secret key for encrypting messages.
8. Where would you place a web server in an organization assuming that you can use a network
firewall and why?
9. What is the role of encryption in the operation of virus? Explain
10. Give the operational description of PGP
11. List the limitations of SMTP/5322 scheme
12. Explain IP security Policy and Encapsulating Security Payload
Concepts
UNIT-I
1. The OSI Security Architecture
2. Cryptography & Cryptanalysis
3. Attacks, services and security mechanisms
4. Caesar Cipher
5. Playfair Cipher
6. Hill Cipher
7. Transposition Techniques rail fence technique
UNIT-II
1. Data Encryption Standard (DES) algorithm
2. Differential and linear cryptanalysis
3. Triple DES
4. Block cipher design principles and modes of operation
5. Advanced Encryption Standard (AES)
6. Stream Ciphers: RC4
Module III
1. Divisibility and The Division Algorithm
2. The Euclidean Algorithm
3. Fermat’s and Euler’s Theorems,
4. Chinese Remainder Theorem
5. Public Key Cryptography Principles of public key cryptosystem
6. RSA algorithm
7. Diffie Hellman Key Exchange
Module IV
1. Message Authentication Hash Functions and Secure Hash Algorithm (SHA) SHA512,
SHA 3
2. Message Authentication Code (MAC)
3. Digital Signatures
4. Requirements for Message Authentication Codes
5. HMAC
6. Digital Signature Standard (DSS)
7. Authenticated Encryption: CCM, GCM
Module V
1. Distribution of Public Keys
2. X.509 Certificates
3. Internet Security: SSL and TLS
4. Email Security: Pretty Good Privacy (PGP), S/MIME
5. IP Security: IP security Policy, Encapsulating Security Payload