Cb3491 Crptography and Cyber Security Question Bank
Cb3491 Crptography and Cyber Security Question Bank
UNIT-I
1 What is Security attack, Security mechanism and Security service?
Security attack: Any action that compromises the security of information owned by an
organization.
Security mechanism: A mechanism that is designed to detect, present or recover from a
security attack.
Security service: A service that enhances the security of the data processing systems and
the information transfer of an organization.
2 Define confidentiality.
Confidentiality ensures that the information in a computer system and transmitted
information are accessible only for reading by authorized parties. This type of access
includes printing, displaying, and other forms of disclosure.
3 Define integrity.
Integrity ensures that only authorized parties are able to modify computer system assets
and transmitted information. Modification includes writing, changing, deleting, creating
and delaying or replaying of transmitted messages.
4 Define Authentication, Nonrepudiation, Availability and Access control.
Authentication: Ensures that the origin of a message is correctly identified, with an
assurance that the identity is not false.
Nonrepudiation: Requires that neither the sender nor the receiver of a message be able
to deny the transmission.
Availability: Requires that computer system assets be available to authorized parties
when needed.
Access control: Requires that access to information resource may be controlled by or for
the target system.
5 List 4 general categories of attack.
Interruption
Interception
Modification
Fabrication
6 Differentiate between Interruption and Interception.
Interruption Interception
An asset of the system is destroyed or becomes An authorized party gains access to the
unavailable or unusable asset
This is an attack on availability This is an attack on confidentiality
E.g.: Destruction of a piece of hardware, the E.g.: Wiretapping to capture data in a
cutting of a communication line, the disabling network, illicit copying of files or
of the file management system. programs.
7 Differentiate between Modification and Fabrication.
Interruption Interception
An unauthorized party not only gains access to An unauthorized party inserts
but tampers with an asset counterfeit objects into the system.
This is an attack on integrity This is an attack on authenticity
E.g.: Changing values in a data file, altering a E.g.: Insertion or spurious message in a
program so that it performs differently network or the addition of records to a
file
8 Compare active and passive attack (Dec 2020)
Active attack Passive attack
These attacks involve some modification of the They are in the nature of
data stream or creation of false stream eavesdropping, on or monitoring of
transmissions
The types of active attacks are The types of passive attacks are
Masquerade Release of message contents
Replay Traffic analysis
Modification
Messages
It is difficult to prevent active
attacks They are very difficult to detect
absolutely. (because they do not move any
alternation to data). But it is feasible to
prevent the success of these attacks.
9 List the components involved in network security (i.e. Model for network security)
Message
Two principals (Source and Destination)
Trusted third party
Opponent
10 List the 4 basic tasks in designing a particular security service.
Design an algorithm for performing the security-related Transformation
Generate the secret information to be used with the algorithm
Develop methods for the distribution and sharing of secret information
Specify a protocol to be used by the two principals.
11 List the five main components of a conventional encryption system.
Plaintext
Encryption algorithm.
Ciphertext
Decryption algorithm
12 Define Plaintext, Ciphertext
Plaintext: Refers to the original message that is created and sent into encryption method.
Ciphertext: It is the text that is now scrambled and ready to send. It may look like a
random stream of data, and is unreadable.
13 How cryptographic systems are generally classified?
Cryptographic systems are generally classified along 3 independent dimensions.
The type of operations used for transforming plaintext into ciphertext
(permutation/substitution)
The number of keys used (single key/different key)
The way in which the plaintext is processed (Block cipher/Stream cipher)
14 Differentiate block cipher and stream cipher.
Block cipher: A block cipher processes the input one block of elements at a time,
producing an output block for each input block.
Stream cipher: A stream cipher processes the input elements continuously, producing
output one element at a time, as it goes along
15 What do you mean by substitutional technique?
A substitutional technique is one in which the letters of the plaintext is viewed as a
sequence of bits, then substitution involves replacing plaintext bit patterns with
ciphertext bit patterns.
16 List some substitution techniques
Caesar Cipher
Monoalphabetic Ciphers
Playfair Ciphers
Hill Cipher
Polyalphabetic Ciphers
17 What is the difference between Monoalphabetic and polyalphabetic cipher? (Dec
2021)
Monoalphabetic Cipher (MAC) Polyalphabetic Cipher (PAC)
A MAC is one where each symbol in the input A PAC is any cipher based on
is mapped to a fixed symbol in the output substitution using multiple
substitution alphabets
In MAC, once a key is chosen, each alphabetic In PAC, each alphabetic character of
character of plain text is mapped onto a unique plaintext can be mapped onto „m‟
alphabetic character of a ciphertext. alphabetic characters of ciphertext.
In MAC, the relationship between a character In PAC, the relationship between a
in the plaintext and the characters in the character in the plaintext and the
ciphertext is one-to-one. characters in ciphertext is one-to-many
18 List out the problems of one-time pad.
Distribution of the key was a challenge.
Adding numbers to the plaintext manually is a time-consuming task. It is
therefore sometimes thought that OTPs are no longer considered practical
19 List the various other techniques used historically for steganography.
Character marking
Invisible ink
Pin purchases
Typewriter correction ribbon
20 Calculate the ciphertext for the following using one-time pad cipher.
Plaintext: R O C K
Keyword: B O T S
Plaintext R O C K
17(R) 14(O) 2(C) 10(K)
Key 1(B) 14(O) 19(T) 18(S)
Plaintext+key 18 28 21 28
Plaintext+key 18 2 21 2
mov 26
Plaintext+key S C V C
21 What are transposition techniques?
(Different kind of) Mapping is achieved by performing some sort of permutation on the
plaintext letters. This technique is referred to as transposition cipher Ex. Rail fence
technique.
22 What is steganography?
Steganography is the practice of concealing a file, message, image or video within
another file, message, image or video. i.e. It is hiding a secret message within an
ordinary message and the extraction of it at its destination.
23 Explain the working mechanism of one-time pad.
The encryption key has at least the same length as the plaintext and consists of
truly random numbers
Each letter of the plaintext is mixed with one element from the OTP.
This results in a ciphertext that has no relation with plaintext when the key is
unknown. At the receiving end, the same OTP is used to retrieve the original
plaintext.
24 Compare steganography and cryptography.
The meaning of steganography is covered or hidden writing while cryptography
signifies secret writing.
Steganography is an attempt to achieve secure and undictable communication.
Cryptography intends to make the message readable for only the target recipient
and not by others.
In steganography, the main structure of the message is not changed whereas
cryptography imposes a change on the secret message before transferring it over
the network.
The steganography can be employed on text, and in video and image while
cryptography is implemented only on the text file.
25 What is threat? List their types.
A threat is a possible security violation that might exploit the vulnerability of a system or
asset. The origin of threat may be accidental, environmental, human negligence or
failure. Different types of security threats are interruption, interception, fabrication and
modification.
26 Connect the given text “anna university” into cipher text using Rail fence technique.
Plaintext is written down as a sequence of diagonals and then read off as a sequence of
rows.
a n u i e s t
n anvriy
The encrypted message is anuiestnanvriy.
27 Differentiate between threats and attacks
A threat is a possible security violation that might exploit the vulnerability of a
system or asset. The origin of threat may be accidental, environmental, human
negligence or failure. Different types of security threats are interruption,
interception, fabrication and modification.
Attack is a deliberate unauthorized action on a system or asset. Attack can be
classified as active and passive attack. An attack will have a motive and will
follow a method when opportunity arise.
28 Encrypt the plaintext tobeornottobe using the vigenere cipher for the key value Now.
(Dec 2020).
The encryption of the original text is done using the vigenere table. The table consists
of the alphabets written out 26 times in different rows, each alphabet shifted cyclically
to the left compared to the previous alphabet, corresponding to the 26 possible Caesar
Ciphers. At different points in the encryption process, the cipher uses a different
alphabet from one of the rows. The alphabet used at each point depends on a repeating
keyword.
plaintext tobeornottobe
key value Now
Transformed text hdysdobdqhdys
29 How substitution cipher is different from transposition cipher. Give example for each
method (Dec 2021)
Substitution cipher Transposition cipher
A substitution technique is one in which Transposition cipher does not substitute
the letters of plain text are replaced by one symbol for another instead it changes
other letters or number or symbols. the location of the symbols
Monoalphabetic and Polyalphabetic Keyless and Keyed transportation cipher.
substitution cipher.
Each letter retains its position changes its Each letter retains its identity but changes
identity its position
Example: Ceaser Cipher, Hill cipher, Example: Rail fence Cipher,
Vigenere cipher
30 Give an example each for substitution and transposition ciphers
Substitution Cipher: (Replace the plaintext characters with other characters, numbers
and equal)
Caesar cipher
Hill cipher
Vigenere cipher
Transposition cipher: (Rearranges the position of the characters of the plaintext)
Rail fence cipher
UNIT-I / PART-B
1 (i) Explain OSI security architecture model with neat diagram (Dec 2020, Dec 2021)
(ii) Describe the various security mechanism (Dec 2020)
2 Encrypt the following using play fair cipher using the keyword MONARCHY.
“SWARAJ IS MY BIRTH RIGHT”. Use X for blank spaces.
3 Describe (i) Playfair Cipher (ii) Rail fence Cipher (iii) Vignere Cipher
4 Perform encryption and decryption using Hill cipher for the following: Message PEN
and key ACTIVATED (Dec 2021)
5 What is steganography? Describe the various techniques used in steganography
6 What is monoalphabetic cipher? Examine how it differs from Caesar cipher (7)(Dec 2020)
ii) Encrypt the message “this is an exercise” using additive cipher with key = 20. Ignore
the space between words. Decrypt the message to get the original plaintext. (6)
7 Explain the network security model and its important parameters with a neat block
diagram
8 Solve using Playfair cipher method. Encrypt the word “Semester Result” with the
keyword “Examination”. Discuss the rules to be followed
9 Explain the ceaser cipher and monoalphabetic cipher.
10 Write note on different types of security attacks and services in detail
11 Explain the substitution encryption technique in detail
12 Discuss examples from real life, where the following security objectives are needed :
i) Confidentiality. (5)
ii) Integrity. (5)
iii) Non-repudiation. (5)
Suggest suitable security mechanisms to achieve them. (Dec 2020, Dec 2021)
13 Discuss the rules to be followed in Playfair method. Encrypt the word“Networksecurity”
with the keyword “cypto” using Playfair method. (Dec 2021)
UNIT II - SYMMETRIC CIPHERS
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular
arithmetic-Euclid’s algorithm- Congruence and matrices – Groups, Rings, Fields- Finite
fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of
DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher
mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 –
Key distribution.
UNIT-II / PART-A
1 What is symmetric key encryption?
Symmetric key encryption is a type of encryption where only one key (a secret key) is
used to both encrypt and decrypt information. The entities communicating via
symmetric encryption must exchange the key so that it can be used in the decryption
process.
2 List the 5 main components of a symmetric encryption system.
Plaintext
Encryption algorithm
Secret key
Ciphertext
Decryption algorithm
3 Give the 5 modes of operations of block cipher. (Dec 2020)
Electronic codebook (ECB)
Cipher block chaining (CBC)
Cipher feedback (CFB)
Output feedback (OFB)
Counter (CTR)
4 List the parameters for the 3 AES version
Parameters AES-128 AES-192 AES-256
Plaintext block size (bits) 128 128 128
Key size (bits) 128 192 256
Number of rounds 10 12 14
5 Compare DES and AES
Parameters DES AES
Developed 1977 2002
Key length 56 bits 128,192 or 256 bits
Cipher type Symmetric block cipher Symmetric block cipher
Block type 64 bits 128 bits
Security Proven inadequate Considered secure
6 Brief the strengths of triple DES
Triple DES is based on the DES algorithm, therefore it is very easy to modify existing
software to use triple DES. It also has the advantage of proven reliability and a longer
key length that eliminates many of the attacks (i.e. Triple DES systems are significantly more
secure than single DES)
7 Determine the GCD of (24140,16762) using Euclid‟s algorithm
GCD (24140, 16762) = GCD (16762, 7378)
= GCD (7378, 2006)
= GCD (2006, 1360)
= GCD (1360, 646)
= GCD (646, 68)
= GCD (68, 34) = GCD (34,0) = 34
8 Determine the GCD of (1970,1066) using Euclid‟s algorithm
GCD (1970,1066) = GCD (1066,904)
= GCD (904, 162)
= GCD (162, 94)
= GCD (94, 68)
= GCD (68, 26)
= GCD (26, 16)
= GCD (16,10)
= GCD (10,6)
= GCD (6,4)
= GCD (4,2)
= GCD (2,0)=2
9 Define finite field?
A field (F, +, .) is called a finite field if the set F is finite. A field is a ring in which the
multiplication operation is commutative, has no zero divisors, and includes an identity
element and an inverse element.
10 Define field and ring in number theory (Dec 2020)
A ring is a set of elements that is closed under two binary operations, addition and
multiplication, with the following: the addition operation is a group that is commutative;
the multiplication operation is associative and is distributive over the addition
operation.
A field is a ring in which the multiplication operation is commutative, has no zero
divisors, and includes an identity element and an inverse element.
11 What is the disadvantage of double DES?
Double DES is an encryption technique which uses two instances of DES on same
plaintext. In both instances it uses different keys to encrypt the plain text. Both keys are
required at the time of decryption. The 64-bit plaintext goes into first DES which then
converts into a 64-bit middle text using the first key and then it goes to second DES
instance which gives 64-bit cipher text by using second key.
However double DES uses 112 bits key but gives security level of 256 not 2112 and this is
because of meet-in-the middle attack which can be used to break through double DES.
12 What is avalanche effect?
Avalanche effect is considered as one of the desirable properties of any encryption
algorithm. A slight change in either the key or the plain-text should result in a significant
change in the ciphertext. This property is termed as avalanche effect.
13 Write notes on RC4.
RC4 is a stream cipher
Designed by Ron Rivest for RSA security
Variable key size stream cipher with byte orientated operations
Algorithm is based on the use of random permutation
RC4 is used in the SSL/TLS standards. Also used in WEP protocol and WPA
protocol
14 Does the set of residue classes (mod 3) form a group?
w.r.t modular addition
w.r.t modular multiplication
Modular addition:
+ 0 1 2
0 0 1 2
1 1 2 0
2 2 0 1
Identity element is 0 and inverses of 0,1,2 are 0,2,1 respectively. So, w.r.t modular
addition it forms a group.
Modular multiplication:
× 0 1 2
0 0 0 0
1 0 1 2
2 0 2 1
Identity element is 1, but 0 has no inverse. So, w.r.t modular multiplication it does not form a
group.
15 Define confusion and diffusion
Confusion refers to making the relationship between the key and the cipher text
as complex and involved as possible
Diffusion refers to the property that redundancy in the statistics of the plaintext is
dissipated in the statistics of plaintext.
16 Write down the purposes of the S-box in DES
In the DES, the substitution consists of a set of 8 S-boxes, each of which accepts 6 bits as
input and produces 4 bits as outputs. The first and last bits of the input to box Si from a
2 bit binary number to select one of four substitutions defined by the 4 rows on the table
011001
Si. The middle 4 bits selects a particular column. Ex: For input ( the row is 01 &
21 mod 5 2 mod 5 2
22 mod 5 4 mod 5 4
1)
23 mod 5 8 mod 5 3
24 mod 5 16 mod 5 1
41 mod 5 4 mod 5 4
42 mod 5 16 mod 5 1
2)
43 mod 5 64 mod 5 4
44 mod 5 256 mod 5 0
So, 4 is not a primitive root of mod 5
7 Name any 2 methods for testing prime numbers.
a(n) 1(mod n)
10 Determine (37) and (35)
To determine (37) : Because 37 is prime, all the positive integers from 1 through 36 are
relatively prime to 37. So, (37) 36 .
To determine (35) :List all the positive integers less than 35 that are relatively prime to
it. (i.e) 1,2,3,4,6,8,9,11,12,13,16,17,18,19,22,23,24,26,27,29,31,32,33,34. There are 24
numbers on the list. So, (35) 24
11 State alternative form of Fermat‟s theorem with example.
The alternative form of Fermat‟s theorem: If p is prime and a is a positive integer than
ap a(mod p)
12 List the 6 ingredients of public key encryption.
Plaintext
Encryption algorithm
Public key
Private key
Cipher text
Decryption algorithm
13 Perform encryption for the plaintext M=88 using the RSA algorithm.
P=17, q=11 and public component e=7
i. p=17, q=11
ii. Calculate n=p*q = 17*11 =187
iii. Calculate (n) = (p-1)(q-1) = 16*10=160
iv. Select e=7
v. Determine d such that de 1(mod 60). The correct value of d is 23
Public key (7,187) and private key (23,187)
Encryption: 887 mod 187 = 11
14 Perform encryption and decryption using the RSA algorithm for the following.
P=7, q=11, e=17 and M=8
i. p=7, q=11
ii. Calculate n=p*q = 7*11 =77
iii. Calculate (n) = (p-1)(q-1) = 6*10=60
iv. Select e=17
v. Determine d such that de 1(mod 60). The correct value of d is 53
Public key (17,77) and private key (53,77)
Encryption: 817 mod 77 = 56
Decryption: 5653 mod 77 = 8
15 List the 5 possible approaches to attacking the RSA algorithm
Brute force
Mathematical attacks
Timing attacks
Hardware fault-based attack
Chosen ciphertext attacks
16 Define discrete logarithm
For any integers b and a primitive r not a of prime number p, we can find a unique
exponent I such that
b ai (mod p) where 0 ≤ I ≤ (p-1)
The exponent I is referred to as the discrete logarithm of b for the base a, mod p.
17 What is the principal attraction of ECC, compared to RSA? (Dec 2021)
The principal attraction of ECC, compared to RSA, is that it appears to offer equal
security for a far smaller key size, thereby reducing processing overhead. But the
confidence level of ECC is not yet as high as than in RSA. (i.e. ECC is fundamentally
more difficult to explain than either RSA or Diffie-Hellman
18 What is an ellipse curve?
Elliptic curve is a plane algebraic curve defined by an equation of the form y2=x3+ax+b
which is non-singular. Formally, an elliptic curve is a smooth, projective, algebraic curve
of genius arc, on which there is a specified point O.
19 Give the significance of key control
Hierarchies of Key Distributor Center (KDC) requires for large networks. A single KDC
may be responsible for a small number of users since it shares the master keys of all the
entities attached to it. If two entities in different domains want to communicate, local
KDCs communicate through a global KDC.
20 Why is asymmetric cryptography bad for huge data? Specify the reasons (May 18)
Asymmetric cryptography takes more time
Key management is difficult
Slower encryption speed due to long keys
21 Give the applications of the public key crypto system
To provide confidentiality (a message that a sender encrypts using the recipients
public key can be decrypted only by the recipient‟s private key
Digital signature (used for sender authentication)
Further applications built on this include: digital cash, password authenticated
key agreement, time-stamping services, non-repudiation protocol, etc.
22 What is the use of Fermat‟s theorem
Fermat‟s theorem is a fundamental theorem in elementary number theory, which helps
compute powers of integers modulo prime numbers.
It is a special case of Euler‟s theorem and is important in applications of elementary
number theory, including primality testing and public key cryptography.
23 Calculate 21102020 (mod 1009) using Fermat‟s theorem.
Are 2110 and 1009 co-prime?
If so, by the theorem 21101008 1 (mod 1009)
By multiplication rule, 21102016 1 (mod 1009)
Same as finding 21104 (mod 1009)
Ans – 21102020 296 (mod 1009)
24 Define primality testing.
A primality test in an algorithm for determining whether an input number is prime
(i.e. Given an number n, check if it is prime or not)
25 State whether symmetric and asymmetric cryptography algorithm needs key exchange
In symmetric key encryption all parties involved in communication have to
exchange the key (a secret key) used to encrypt the data before they can decrypt it
(This is the main disadvantage of symmetric encryption)
Asymmetric key encryption uses two keys. A public key is made freely available
to anyone who might want to send you a message. The second key, private key is
kept secret.
26 Using Fermat‟s theorem find 5201 and mod 41
ap-1 1 (mod p) where p is prime number and a is a positive integer not divisible by p.
540 1 (mod 41)
(540)5 1 (mod 41)
51 5 (mod 41)
So,5201 5 (mod 41)
27 Find the GCD of (2740, 1760) using Euclid‟s Algorithm. (Dec 2020)
GCD (2740,1760) = GCD (1760,980)
= GCD (980, 780)
= GCD (780, 200)
= GCD (200, 180)
= GCD (180, 20)
= GCD (20, 0)
= 20
28 For p = 11 and q = 19 and choose d = 17. Apply RSA algorithm where Cipher message
= 80 and thus find the plain text. (Dec 2020)
n = pq = 11 × 19 = 209.
C=Me mod n ; C=517 mod 209 ; C = 80 mod 209.
So the plain text is 5
29 What is meet in the Middle Attack? (Dec 2021)
A Meet-in-the-Middle (MitM) Attack is a kind of cryptanalytic attack where the
attacker uses some kind of space or time tradeoff to aid the attack.
MitMs can take the form of dividing the target communication into two so that
each piece can be addressed individually.
It could mean transforming an attack requiring X amount of time into one
requiring Y time and Z space. The aim is to significantly reduce the effort needed
to perform a brute-force attack.
UNIT-III / PART-B
1 State Chinese Remainder Theorem and find X for the given set of congruent equations
using CRT
X = 2 (mod 3)
X = 3 (mod 5)
X = 2 (mod 7)
2 State and prove Fermat‟s theorem.
3 Explain RSA algorithm, perform encryption and decryption to the system with
p=7, q=11, e=17, M=8
4 Users Alice and Bob use the Diffie-Hellman key exchange technique with a common
prime q=83 and a primitive root α=5.
i. If Alice has a private key X A=6, what is Alice‟s public key Y A?
ii. If Bob has a private key XB=10, what is Bob‟s public key YB?
10 Define Spyware.
Spyware is a type of malware that is installed on computers which collects information
about users without their knowledge. It is clearly understood from the term Spyware that
it secretly monitors the user. The features and functions of such Spywares are beyond
simple monitoring.
11 Define SQL injection.
SQL injection, also known as SQLI, is a common attack vector that uses malicious
SQL code for backend database manipulation to access information that was not
intended to be displayed. This information may include any number of items,
including sensitive company data, user lists or private customer details.
12 What are the Types of SQL Injections
In-band SQLi
Error-based SQLi
Union-based SQLi
Inferential (Blind) SQLi
Out-of-band SQLi
13 What is network access control?
Network access control (NAC), also known as network admission control, is the process of
restricting unauthorized users and devices from gaining access to a corporate or private
network. NAC ensures that only users who are authenticated and devices that are authorized
and compliant with security policies can enter the network.
14 What Are the Advantages of Network Access Control?
Control the users entering the corporate network
Control access to the applications and resources users aim to access
Allow contractors, partners, and guests to enter the network as needed but restrict
their access
Segment employees into groups based on their job function and build role-based
access policies
Protect against cyberattacks by putting in place systems and controls that detect
unusual or suspicious activity
Automate incident response
Generate reports and insights on attempted access across the organization
15 What is Cloud Security
Cloud security is a responsibility that is shared between the cloud provider and the
customer. There are basically three categories of responsibilities in the Shared
Responsibility Model: responsibilities that are always the provider’s, responsibilities
that are always the customer’s, and responsibilities that vary depending on the service
model, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a
Service(SaaS), such as cloud email.
16 What are the Challenges of Advanced Cloud Security?
Increased Attack Surface
Lack of Visibility and Tracking
Ever-Changing Workloads
DevOps, DevSecOps and Automation
Granular Privilege and Key Management
Complex Environments
Cloud Compliance and Governance
17 Write short notes on Web Security.
Web Security deals with the security of data over the internet/network or web or while it is
being transferred to the internet. For e.g. when you are transferring data between client and
server and you have to protect that data that security of data is your web security.
18 What are the different types of Security Threats
Cross-site scripting (XSS)
SQL Injection, Phishing, Ransomware, Code Injection Viruses and worms, Spyware, Denial of
Service
19 Define Wireless Security.
Wireless security is the prevention of unauthorized access or damage to computers or data
using wireless networks, which include Wi-Fi networks. The term may also refer to the
protection of the wireless network itself from adversaries seeking to damage the
confidentiality, integrity, or availability of the network.