Sem-VII - NS - Practical Exam Question Bank
Sem-VII - NS - Practical Exam Question Bank
1. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with number 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.
2. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with special character 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.
3. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with any other character 2. Reverse the string.
Decrypt the encrypted message again in which original text should be retrieved. Write down
algorithm and draw flowchart of given problem statement.
4. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Reverse the string 2. Swap two adjacent characters with each other.
No need to swap last character if text includes odd number of characters. Decrypt the
encrypted message again in which original text should be retrieved. Write down algorithm
and draw flowchart of given problem statement.
5. Consider your name as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
6. Consider your email id as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
7. Consider your PRN as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
8. Consider your mobile number as a user input. Generate its hash value using any SHA
technique and deliver it to other user2/server side. On other user2/server side, it should
display the hash value delivered by user1.
9. Consider your name as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
10. Consider your email id as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
11. Consider your PRN as a user input. Generate its hash value using any MD technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
12. Consider your mobile number as a user input. Generate its hash value using any MD technique
and deliver it to other user2/server side. On other user2/server side, it should display the
hash value delivered by user1.
13. Consider user input as your PRN. If its generated hash value is matched with stored hash value
then it should display the message as “Password matched”.
14. Consider user input as your email id. If its generated hash value is matched with stored hash
value then it should display the message as “Password matched”.
15. Consider user input as your name. If its generated hash value is matched with stored hash
value then it should display the message as “Password matched”.
16. Consider user input as your exam seat number. If its generated hash value is matched with
stored hash value then it should display the message as “Password matched”.
17. Consider user input as a text. Apply following encryption logic to generate cipher text from
user input. Steps: 1. Replace each character with number 2. Reverse the string. Decrypt the
encrypted message again in which original text should be retrieved. Write down algorithm
and draw flowchart of given problem statement.
18. Consider your name as a user input. Generate its hash value using any SHA technique and
deliver it to other user2/server side. On other user2/server side, it should display the hash
value delivered by user1.
19. Consider user input as your PRN. If its generated hash value is matched with stored hash value
then it should display the message as “Password matched”.
20. Consider any text as a user1 input. Generate encrypted data using following steps and send it
to other user2/ server. Steps: 1. Encrypted data should be generated using your PRN which is
considered as a key. 2. Apply own logic to generate encrypted data.
21. Encrypted data should be displayed on other user2/server side. When sender will send the
key, decrypted data/original text will be displayed on other user2/server side. Write down
algorithm and draw flowchart of given problem statement.
22. Consider any text as a user1 input. User1 should generate encrypted data using his/her key
which is PRN number. Encrypted data will be delivered to the other user2/server. Other
user2/server will re-encrypt the received data using his/her key and delivered back to user1.
User 1 will take out his/her key after which some encrypted data will be generated. Same data
will be delivered to the user2/server. On user2 / server side, last received encrypted data will
be decrypted using his/her key. Write down algorithm and draw flowchart of given problem
statement. Apply own logic to generate encrypted data.
24. Which is the ciphering technique that shifts the plain text characters to create cipher text,
implement it.
26. which is the ciphering technique which is based on polygraphic substitution. Code the
implementation.
27. Code the implementation for vigenere cipher.
28. which is the cipherinng technique which is based on poly alphabetic substitution. Code its
implementation.
32. Implement secret key exchange algorithm which had contributions from Whitfield Diffie.
33. Implement secret key exchange algorithm which had contributions from Martin Hellman.
34. Implement secret key exchange algorithm which had contributions from Martin Hellman
and Whitfield Diffie.
37. Calculate message digest of given text using SHA-1 algorithm. Text: "Hello World".
38. Calculate message digest of given text using Secure Hash Algorithm - 1. Text: "abc".