0% found this document useful (0 votes)
35 views8 pages

Question Bank Cryptogrpahy Updated

F6xxufxcfcf7cf7ctx6rx7r6fx7tcfuhkgfuxyfxf6cf6cyt7c7tc7tct7c7tccgcigct8xit7txtxt7xr7x7tghjjjjjjh+Gunnu rr74ae9b731f c

Uploaded by

s2298054
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views8 pages

Question Bank Cryptogrpahy Updated

F6xxufxcfcf7cf7ctx6rx7r6fx7tcfuhkgfuxyfxf6cf6cyt7c7tc7tct7c7tccgcigct8xit7txtxt7xr7x7tghjjjjjjh+Gunnu rr74ae9b731f c

Uploaded by

s2298054
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Cryptography & Network Security

Semester-VII
Program-B.Tech CSE

UNIT -1 2- MARKS
1 Define cryptography in the context of network security. CO1
2 What is the difference between authentication and authorization? CO1
3 What is steganography, and how does it differ from cryptography? CO1
4 What is watermarking in the context of data security? CO1
5 Explain the concept of confusion and diffusion as per Shannon’s theory. CO1
6 What is the purpose of a substitution cipher in cryptography? CO1
7 What is the purpose of a substitution cipher in cryptography? CO1
8 Define transposition cipher and give an example. CO1
9 What is the Feistel structure used for in block ciphers? CO1
10 Name any two types of classical ciphers. CO1
11 Define cryptanalysis. CO1
12 What is the role of key management in cryptography? CO1
13 Explain the basic working principle of the DES algorithm. CO1
14 What is the strength of a cipher in cryptography? CO1
15 What does the term "meet-in-the-middle" attack refer to? CO1
16 How does the Man-in-the-Middle attack work? CO1
17 What is the main purpose of encryption in cryptography? CO1
18 What is the difference between symmetric and asymmetric encryption models? CO1
19 Describe block cipher and stream cipher CO1
20 What is a brute force attack in cryptanalysis? CO1
21 What does the term cryptographic protocol mean? CO1
5 MARKS
22 Explain the services and mechanisms provided by cryptography in ensuring data CO1
security.
23 Describe the working of a classical substitution cipher. How does it encrypt and CO1
decrypt text?
24 Explain how a transposition cipher works. Provide an example. CO1
25 Discuss Shannon’s theory of confusion and diffusion. How do these concepts CO1
contribute to the strength of a cipher?
26 What is a Feistel cipher structure? Explain its use in modern block ciphers like CO1
DES.
27 Compare and contrast symmetric encryption and asymmetric encryption. CO1
Discuss their strengths and weaknesses.
28 Discuss the process of cryptanalysis. What are the main types of cryptanalytic CO1
attacks?
10 marks
29 Explain the DES (Data Encryption Standard) algorithm. How does it ensure data CO1
security? Discuss its main components.
30 Explain the various cryptographic services and mechanisms used to secure CO1
communication.
31 Explain the working of substitution ciphers such as the Caesar cipher and the CO1
monoalphabetic cipher. Discuss how these ciphers can be broken through
frequency analysis and other cryptanalytic methods. What are the main
limitations of substitution ciphers?
32 Discuss the Feistel cipher structure and its application in block ciphers such as CO1
DES.
33 Describe the working of the DES (Data Encryption Standard) algorithm and CO1
discuss its strengths and weaknesses.
34 What are the types of cryptographic attacks, and how do they apply to modern CO1
ciphers?
35 Describe the Man-in-the-Middle attack and discuss methods to prevent it. CO1
36 What are the key differences between symmetric and asymmetric encryption CO1
models, and what are their respective advantages in various applications?

UNIT-II 2 MARKS
1 What is the Euclidean Algorithm used for in number theory? CO2
2 Define modular arithmetic and give an example. CO2
3 What is a group in mathematical terms? CO2
4 Define a finite field. Give an example. CO2
5 What is the order of an element in a group? CO2
6 What does GF(p) stand for in finite fields? CO2
7 What is polynomial arithmetic in the context of cryptography? CO2
8 Explain the importance of prime numbers in cryptography. CO2
9 State Fermat’s Little Theorem. CO2
10 State Euler's Theorem. CO2
11 What is public key cryptography? CO2
12 What is the basic idea behind the RSA algorithm? CO2
13 What is the role of modular exponentiation in RSA? CO2
14 What is the Diffie-Hellman Key Exchange Algorithm used for? CO2
15 Explain Elliptic Curve Cryptography (ECC) in simple terms. CO2
16 What is a birthday attack in cryptography? CO2
17 Define pseudorandom numbers and why they are important in cryptography. CO2
18 How is the AES algorithm related to symmetric key encryption? CO2
19 What is a cipher block chaining (CBC) mode of AES encryption? CO2
20 What is the main advantage of Elliptic Curve Cryptography (ECC) over RSA? CO2
21 Explain the Euclidean Algorithm and its application in finding the greatest CO2
common divisor (GCD) of two numbers.
5 MARKS
22 Describe the steps involved in modular exponentiation and its significance in CO2
cryptographic algorithms like RSA.
23 Explain the concept of groups in number theory. Discuss the properties of a CO2
group, and give an example of a cryptographic application.
24 Discuss finite fields of the form GF(p). How are they used in cryptographic CO2
systems like AES and elliptic curve cryptography (ECC)?
25 Explain the working of the RSA algorithm. How does RSA use number theory CO2
concepts like modular exponentiation and prime factorization for encryption and
decryption?
26 Describe the Diffie-Hellman Key Exchange Algorithm. How do two parties CO2
securely exchange a secret key over an insecure channel using Diffie-Hellman?
27 Explain Fermat’s Little Theorem and its application in cryptography. How is it CO2
used in algorithms like RSA?
28 Explain Euler’s Theorem and its significance in number theory and CO2
cryptography.
10 MARKS
29 Explain in detail the operation of AES( Advance encryption standard) . How it CO2
works?
30 Explain the process of the Euclidean algorithm for finding the greatest common CO2
divisor (GCD) of two numbers. Illustrate its use in key generation, particularly
in the RSA algorithm and other cryptographic protocols.
31 Define modular arithmetic and demonstrate how it is used in public key CO2
cryptosystems like RSA. Explain how modular exponentiation works in RSA
encryption and decryption.
32 Define finite fields, specifically GF(p) (where p is a prime number), and discuss CO2
their properties. Explain how finite fields are used in cryptographic algorithms
like AES and Elliptic Curve Cryptography (ECC).
33 Provide a comprehensive explanation of the RSA algorithm, including the CO2
mathematical principles it relies on, such as modular exponentiation, prime
factorization, and Euler's theorem.

34 Explain how Diffie-Hellman allows two parties to securely exchange CO2


cryptographic keys over an insecure channel. Discuss the role of modular
exponentiation and prime numbers in the algorithm.
35 Discuss the concept of Elliptic Curve Cryptography (ECC) and its advantages CO2
over traditional algorithms like RSA.
36 Explain all the design parameters of Feistel cipher network CO2
UNIT –III 2 MARKS
1 What is a digital signature standard (DSS)? CO3
2 What is a hash function in cryptography? CO3
3 Define data integrity in the context of network security. CO3
4 State any two applications of hash functions in cryptography. CO3
5 What does the term "collision resistance" mean in the context of hash functions? CO3
6 Explain the role of a hash function in digital signatures. CO3
7 What is the purpose of a message authentication code (MAC) CO3
8 Briefly describe the concept of "pre-image resistance" for a hash function. CO3
9 Name any two widely used cryptographic hash functions. CO3
10 What is the function of SHA-1 in cryptographic systems? CO3
11 Define HMAC (Hashed Message Authentication Code). CO3
12 What are the main security requirements for a cryptographic hash function? CO3
13 What is the difference between a hash function and a MAC? CO3
14 What is the basic idea behind Cipher Block Chaining (CBC)? CO3
15 How does SHA-256 differ from SHA-1? CO3
16 What is a Digital Signature and why is it important in security? CO3
17 What are the key properties of a secure message authentication code (MAC)? CO3
18 State any two disadvantages of using SHA-1 in cryptographic applications. CO3
19 Define "second pre-image resistance" in the context of hash functions. CO3
20 What is the significance of the "salt" in hash functions? CO3
5 MARKS
21 Encrypt the message "CRYPTOGRAPHY" using caesar cipher with a shift of 4. CO3
show the encryption process step by step and provide the final encrypted
message.
22 Explain the working of a cryptographic hash function and its role in ensuring CO3
data integrity.
23 What are the security requirements for a cryptographic hash function? Discuss CO3
each requirement.
24 Compare and contrast SHA-1, SHA-256, and SHA-512 in terms of security and CO3
application.
25 How does Cipher Block Chaining (CBC) mode work in relation to hash CO3
functions? Explain its application
26 Define MAC (Message Authentication Code) and explain its key properties with CO3
an example.
27 What is HMAC (Hashed Message Authentication Code)? How is it different CO3
from a regular MAC?
28 Discuss the importance of digital signatures in public key cryptography and how CO3
they are generated and verified.
29 What are the security weaknesses in the original MD5 algorithm? Why has it CO3
been deprecated in favor of stronger alternatives?
10 marks
30 Explain how hash functions contribute to the concept of data integrity in CO3
network security?
31 Compare the performance and security of SHA-1 with SHA-256 and SHA-512, CO3
highlighting their use cases in modern cryptography.
32 Explain the concept of MAC, its applications in network security, and the basic CO3
algorithms used to generate MACs.
33 Explain the working of digital signatures, including the key concepts of public- CO3
key cryptography involved in their generation and verification
34 Provide a detailed explanation of data integrity, why it is critical for secure CO3
communications, and how hash functions like SHA and HMAC are used to
verify the integrity of data.
35 Discuss the structural and functional differences between cryptographic hash CO3
functions and Message Authentication Codes (MACs). and their respective use
cases, and how they both contribute to ensuring data integrity and authenticity in
communication protocols.
36 Provide a detailed explanation of Cipher Block Chaining (CBC) mode of CO3
operation, its significance in block ciphers, and how it can be adapted to work
with hash functions to provide encryption and data integrity.
37 Explain the working of the Digital Signature Algorithm DSA for creating and CO3
verifying digital signatures. Include the steps involved in key generation,
signing, and verification.
UNIT-IV 2 MARKS
1 What is asymmetric key encryption? CO4
2 State any two advantages of symmetric key encryption. CO4
3 What is the main limitation of symmetric key encryption? CO4
4 What is the key difference between symmetric and asymmetric encryption? CO4
5 Define key distribution in cryptography. CO4
6 What is the role of a key exchange algorithm in symmetric key distribution? CO4
7 Explain the term "public key infrastructure (PKI)". CO4
8 What is the purpose of X.509 certificates in public key infrastructure? CO4
9 Name any two key exchange protocols used for symmetric key distribution. CO4
10 Describe the concept of "public key cryptography". CO4
11 What is the function of a digital certificate? CO4
12 What does the term "non-repudiation" mean in the context of key distribution? CO4
13 What is meant by a "trusted third party" in asymmetric key distribution? CO4
14 What is the difference between weak and strong collision resistance? CO4
15 State the role of RSA in key distribution. CO4
16 What is the role of a certificate authority (CA) in PKI? CO4
17 What does an X.509 certificate typically contain? CO4
18 What is the difference between a private key and a public key? CO4
19 Define symmetric key encryption. CO4
5 MARKS
20 Explain the process of symmetric key distribution. Discuss how symmetric keys CO4
are exchanged securely.
21 Describe the concept of asymmetric key distribution and how it is used to CO4
exchange symmetric keys.
22 Explain all the requirements should a digital signature scheme should satisfy? CO4
23 Perform encryption and decryption using RSA Algorithm for the following.. CO4
P=7; q=11; e=17; M=8.
24 Discuss the role and importance of X.509 certificates in secure communication. CO4
How do they help in key management?
25 In a Diffie-Hellman key exchange, the agreed-upon parameters are: CO4

 Prime number p=17


 Primitive root g=3

Alice selects her private key a=7, and Bob selects his private key b=11.
Compute the public keys A and B exchanged between Alice and Bob. Using the
public keys, calculate the shared secret key S that both Alice and Bob derive.

26 What is the significance of a certificate authority (CA) in the distribution of CO4


public keys? Explain how the CA verifies identities.
10 MARKS
27 What is the difference between public key cryptography and symmetric key CO4
cryptography in terms of key management?
28 Explain the process of symmetric key distribution using asymmetric encryption. CO4
29 Explain kerberos authentication mechanism with suitable diagram? CO4
30 Describe the components of public key infrastructure PKI, including certificate CO4
authorities (CAs), registration authorities (RAs), and digital certificates. Discuss
how these components interact to securely distribute public keys and ensure
authentication and confidentiality in communication.
31 Explain the process of key management using hybrid encryption. CO4
32 Describe the role of the certificate authority (CA) in managing public keys and CO4
issuing digital certificates.
33 Discuss common security challenges in key management and distribution, such CO4
as key interception, key replication, and man-in-the-middle attacks. Explain
how techniques like digital signatures, certificates, and secure key exchange
protocols (e.g., Diffie-Hellman, RSA) help mitigate these risks
UNIT-V 2 MARKS
1 What is user authentication in the context of network security? CO5
2 Define remote user authentication. CO5
3 What is Kerberos authentication protocol? CO5
4 State the main purpose of a firewall in network security. CO5
5 Differentiate between NIDS (Network Intrusion Detection System) and HIDS CO5
(Host-based Intrusion Detection System).
6 What is an access matrix in the context of access control? CO5
7 What is the primary function of an intrusion detection system (IDS)? CO5
8 Explain the concept of a honey pot in network security. CO5
9 Define IP Security (IPsec). CO5
10 What is AH (Authentication Header) in IPsec? CO5
11 Describe the purpose of the ESP (Encapsulating Security Payload) in IPsec. CO5
12 What are the benefits of using asymmetric encryption for remote user CO5
authentication?
13 How does Kerberos prevent replay attacks? CO5
14 What is the role of a trusted third party in the Kerberos authentication process? CO5
15 Define the term "intrusion detection." CO5
16 Explain the firewall design principles. CO5
17 How does a firewall protect against unauthorized access to a network? CO5
18 What is the role of a certificate authority (CA) in remote user authentication CO5
using asymmetric encryption?
19 What is a common use case for honey pots in network security? CO5
20 What does NIDS monitor, and how does it detect intrusions? CO5
5 Marks
21 Explain the principles of remote user authentication. How does it differ from CO5
local authentication?
22 Discuss the working of the Kerberos authentication protocol. How does it CO5
ensure secure communication between clients and servers?
23 Explain the differences between NIDS and HIDS. What are the advantages and CO5
disadvantages of each?
24 How does asymmetric encryption work in remote user authentication? Discuss CO5
its use in ensuring secure logins.
25 What is the function of a firewall in a network? Discuss the different types of CO5
firewalls and their roles in user authentication.
26 Discuss how intrusion detection systems (IDS) work. What are the differences CO5
between signature-based and anomaly-based IDS?
27 Explain the concept of an access matrix and how it is used in access control CO5
mechanisms.
28 Describe the concept of honey pots. How do they help in detecting and CO5
preventing attacks?
10 MARKS
29 Describe the steps involved in the Kerberos authentication process, including CO5
the role of the Key Distribution Center (KDC), Ticket Granting Ticket (TGT),
and service tickets.
30 Explain how Network-based Intrusion Detection Systems (NIDS) and Host- CO5
based Intrusion Detection Systems (HIDS) work, the advantages and
disadvantages of each, and their respective roles in detecting network intrusions.
How do these systems identify suspicious activity, and what are the challenges
associated with each type of system?
31 Describe the process of remote user authentication using asymmetric CO5
encryption.
32 Explain the concept of a firewall, its purpose in securing networks, and the CO5
different types of firewalls (packet-filtering, stateful, and proxy). Discuss how
firewalls implement policies to control access and how they interact with
authentication systems to ensure secure communication.
33 Explain what honey pots are, how they are set up, and how they function in CO5
trapping attackers. Discuss the different types of honey pots (e.g., production,
research, high-interaction, and low-interaction) and how they contribute to
improving security by providing false targets and gathering intelligence.
34 Provide a detailed explanation of the IPsec protocol and its two main CO5
components: Authentication Header (AH) and Encapsulating Security Payload
(ESP).
35 Describe the main challenges faced in securing remote user authentication, such CO5
as password theft, man-in-the-middle attacks, and phishing. Explain how
technologies like two-factor authentication (2FA), Kerberos, and asymmetric
encryption address these challenges.
36 Analyze the challenges of configuring firewalls in a modern network. How can CO5
misconfigurations affect network security? Provide solutions to mitigate such
issues.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy