0% found this document useful (0 votes)
53 views5 pages

Sem-VII - NS - Practical Exam Question Bank

The document contains 40 questions related to encryption algorithms, hashing techniques, and key exchange protocols. The questions cover implementing classic encryption algorithms like Caesar cipher, Hill cipher, and Vigenere cipher. They also cover hashing text using SHA-1, MD5, and generating digital signatures. Several questions involve implementing key exchange protocols like Diffie-Hellman, RSA, and secret key exchange with contributions from Whitfield Diffie and Martin Hellman.

Uploaded by

Khushbu Rathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views5 pages

Sem-VII - NS - Practical Exam Question Bank

The document contains 40 questions related to encryption algorithms, hashing techniques, and key exchange protocols. The questions cover implementing classic encryption algorithms like Caesar cipher, Hill cipher, and Vigenere cipher. They also cover hashing text using SHA-1, MD5, and generating digital signatures. Several questions involve implementing key exchange protocols like Diffie-Hellman, RSA, and secret key exchange with contributions from Whitfield Diffie and Martin Hellman.

Uploaded by

Khushbu Rathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Question Bank:

1. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with number 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.

2. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with special character 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.

3. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with any other character 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.

4. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Reverse the string 2. Swap two adjacent characters with each other.
No need to swap last character if text includes odd number of characters. Decrypt the
encrypted message again in which original text should be retrieved. Write down algorithm
and draw flowchart of given problem statement.

5. Consider your name as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

6. Consider your email id as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

7. Consider your PRN as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

8. Consider your mobile number as a user input. Generate its hash value using any SHA
technique and deliver it to other user2/server side. On other user2/server side, it should
display the hash value delivered by user1.
9. Consider your name as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

10. Consider your email id as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

11. Consider your PRN as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

12. Consider your mobile number as a user input. Generate its hash value using any MD technique
and deliver it to other user2/server side. On other user2/server side, it should display the
hash value delivered by user1.

13. Consider user input as your PRN. If its generated hash value is matched with stored hash value
then it should display the message as “Password matched”.

14. Consider user input as your email id. If its generated hash value is matched with stored hash
value then it should display the message as “Password matched”.

15. Consider user input as your name. If its generated hash value is matched with stored hash
value then it should display the message as “Password matched”.

16. Consider user input as your exam seat number. If its generated hash value is matched with
stored hash value then it should display the message as “Password matched”.
17. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with number 2. Reverse the string. Decrypt the
encrypted message again in which original text should be retrieved. Write down algorithm
and draw flowchart of given problem statement.

18. Consider your name as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.

19. Consider user input as your PRN. If its generated hash value is matched with stored hash value
then it should display the message as “Password matched”.

20. Consider any text as a user1 input. Generate encrypted data using following steps and send it
to other user2/ server. Steps: 1. Encrypted data should be generated using your PRN which is
considered as a key. 2. Apply own logic to generate encrypted data.

21. Encrypted data should be displayed on other user2/server side. When sender will send the
key, decrypted data/original text will be displayed on other user2/server side. Write down
algorithm and draw flowchart of given problem statement.

22. Consider any text as a user1 input. User1 should generate encrypted data using his/her key
which is PRN number. Encrypted data will be delivered to the other user2/server. Other
user2/server will re-encrypt the received data using his/her key and delivered back to user1.
User 1 will take out his/her key after which some encrypted data will be generated. Same data
will be delivered to the user2/server. On user2 / server side, last received encrypted data will
be decrypted using his/her key. Write down algorithm and draw flowchart of given problem
statement. Apply own logic to generate encrypted data.

23. Code the implementation for Caesar Cipher.

24. Which is the ciphering technique that shifts the plain text characters to create cipher text,
implement it.

25. Code the implementation for Hill Cipher.

26. which is the ciphering technique which is based on polygraphic substitution. Code the
implementation.
27. Code the implementation for vigenere cipher.

28. which is the cipherinng technique which is based on poly alphabetic substitution. Code its
implementation.

29. Perform Encryption, decryption using any substitution techniques.

30. Implement RSA algorithm using HTML and JavaScript.

31. Implement Diffie-Hellman key exchange algorithm.

32. Implement secret key exchange algorithm which had contributions from Whitfield Diffie.

33. Implement secret key exchange algorithm which had contributions from Martin Hellman.

34. Implement secret key exchange algorithm which had contributions from Martin Hellman
and Whitfield Diffie.

35. Calculate message digest of a text using SHA-1 algorithm.

36. Calculate message digest of a text using Secure Hash Algorithm - 1.

37. Calculate message digest of given text using SHA-1 algorithm. Text: "Hello World".
38. Calculate message digest of given text using Secure Hash Algorithm - 1. Text: "abc".

39. Implement Signature scheme- Digital signature Standard.

40. Implement Diffie-Hellman key exchange algorithm for values P: 7, G: 3, a: 4, b: 5.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy