0% found this document useful (0 votes)
887 views8 pages

Question Bank

This document contains a list of questions and marks for the subject "Information and Network Security". It covers topics in symmetric and asymmetric cryptography, classical encryption techniques like substitution and transposition ciphers, block and stream ciphers, modes of operation, public key cryptography including RSA, and cryptanalysis. The questions range from definitions and short explanations to longer questions explaining algorithms and concepts in cryptography and security.

Uploaded by

vishal sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
887 views8 pages

Question Bank

This document contains a list of questions and marks for the subject "Information and Network Security". It covers topics in symmetric and asymmetric cryptography, classical encryption techniques like substitution and transposition ciphers, block and stream ciphers, modes of operation, public key cryptography including RSA, and cryptanalysis. The questions range from definitions and short explanations to longer questions explaining algorithms and concepts in cryptography and security.

Uploaded by

vishal sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Ahmedabad Institute of Technology

CE-IT Department (SEM VII)

Subject Name: Information and Network Security


Subject Code: 2170709

Sr. Questions Ma
No rks
Unit:1
TOPIC:1: Symmetric Cipher Model, Cryptography, Crypt-analysis and Attacks

1 Define Cryptography and Crypt-analysis. Draw and explain conventional cryptosystem. 7


- (Jan-13)
2 Differentiate Symmetric and Asymmetric key cryptography.- (Nov-11) what are 3
challenges of symmetric key cryptography? List out various symmetric key algorithms
- Nov 2016
4 Explain the Conventional security model used for Information security. - (May- 7
14)
5 Define the terms threat and attack. List and briefly define categories of security 4
attacks.- (Nov-13)
6 List and briefly define the security services. OR What is security Services? Explain any 3,7
three types of security services. - (Nov-13, Nov-14)

8 What is Security mechanism? List and explain various security mechanism.- 7


(May-14)
9 What is the objective of attacking an encryption system? Write the two approaches to 7
attack a conventional encryption scheme.- (May-12)
10 Explain Various types of Attack on Computer System.- (May-14) 7
11 When an encryption scheme is said to be unconditionally secure and computationally 3
secure? - (May-15)
12 What is the difference between passive and active security threats? List and briefly 7
define categories of passive and active security attacks. - (Dec-15)
13 Give examples of replay attacks. List three general approaches for dealing with replay 3
attacks. - (Dec-15)
14 Explain data confidentiality,data authentication and data integrity. - (May-16) May-2018 7
15 Write a short note on: Cipher text only attack. Timing attack
16 Discuss the following terms in brief: Passive attack - Cryptanalysis- (Nov-17)
TOPIC:2 Substitution and Transposition techniques

1 What is Play fair cipher with suitable example. - (May-14) May-2018 7


2 Let the keyword in playfail cipher is “keyword”. Encrypt a message “come to the 7
window” using playfair cipher.- (Jan-13)
3 Construct a playfair matrix with the key “occurrence”. Generate the cipher text for the 3
plaintext “Tall trees” OR Construct 5 X 5 playfair matrix for the keyword
“OCCURANCE”. - (May-11, Nov-11, Nov-13)
4 Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair matrix with the 3
key “moonmission” and encrypt the message “greet”.- (May-13)
5 Define the Caesar cipher.- (May-12) 3
6 Construct a Playfair matrix with the key “engineering”. And encrypt the message “test 4
this process”.- (May-12)
7 Use playfair algorithm with key “monarchy” and encrypt the text “jazz”. - (May- 4
15)
8 Using playfair cipher encrypt the plaintext “Why, don’t you?”. Use the key “keyword”. 4
- (Dec-15)
9 Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.- 7
(Nov-13) May-2018
10 Explain Vegenere Cipher.- (Nov-14) 7
11 Which type of substitution is called monoalphabetic substitution cipher? - (May- 1
15)
12 Which two principal methods are used in substitution ciphers to lessen the extent to 2
which the structure of the plaintext survives in the ciphertext? - (May-15)
13 3
Encrypt the message “Good morning” using the Hill Cipher with the key
- (May-11)
14 4
Encrypt the message “Exam” using the Hill Cipher with the key- (May-15)

15 4

Use Hill cipher to encrypt the text DEF. The key to be used is- (Dec-15)
16 Explain generation of encryption matrix in play fair cipher. - (May-16) 7
17 Explain the one time pad scheme.- (May-12) May-18 3
18 Explain rail fence Cipher technique. - (May-16) May 2019 7
19 Explain one time pad cipher with example. - (May-16) what are practical issue of this 7
algorithm. - Nov 2016
20 Explain Attributes of Security.-
21 Briefly explain Classical Encryption Techniques. -
22 Briefly explain Transposition Encryption Techniques.- Nov-2017
23 Compare Steganography with encryption techniques.-
24 Write a short note on Hill cipher-(Nov -16) Nov-2017
25 difference between substitution and transposition technique. - (May 2017)
Unit:2
TOPIC:1: Stream ciphers and block ciphers, Block Cipher structure

1 Define Block Cipher. Explain Design Principles of block cipher.- (Nov-14) 7


2 Draw and explain Feistel’s structure for encryption and decryption.- (Nov-11) 7
3 The exact realization of Feistel network depends on the choice of which 3
parameters?- (May-12)
4 List and explain various types of attacks on encrypted message.- (Jan-13, May- 7
14)
5 Explain the various types of cryptanalytic attack, based on the amount of information 4
known to the cryptanalyst.- (May-11)
6 Explain Cryptanalysis. Discuss any one technique for it. - (May-14) 7
7 Define the term cryptanalysis. Explain various types of cryptanalytic attacks. - 7
(Dec-15)
8 What are the differences between stream cipher and block cipher?- Nov-2017 Dec 2018
9 Which two methods are used to frustrate statistical cryptanalysis? May 2019
TOPIC:2: Data Encryption standard (DES) with example, strength of DES, Design
principles of block cipher

1 What is the purpose of S-boxes in DES? Explain the avalanche effect.- (May-11) Dec 3
2018
2 Explain the terms diffusion and confusion.- (May-11,Dec-15) 3
3 Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain 7
the avalanche effect in DES.- (Nov-13)
4 Draw and explain the single round of DES algorithm - (Jan-13) 7
Explain single round function of DES with suitable diagram.- (Nov-11)
Explain single round of DES algorithm. - (Dec-15)
5 Explain the DES encryption algorithm.- (May-12) May 2017 7
Explain DES algorithm with figure.-(Nov-14) Nov-2017
6 Explain Sub key generation Process in Simplified DES algorithm with Example.- 7
(Nov-14) Nov-16
7 Explain limitations of DES in detail. - (May-14) 7
8 Explain scheme for DES encryption. - (May-15) Dec 2018 7
9 With example explain function of s-box in DES. - (May-16) 7
10 Explain various steps of AES in short. - (May-16) Nov- 16 May 2017 Nov-2017 May-18, 7
19 Dec 2018
11 What are the essential ingredients of a symmetric cipher? - Nov-17
12 What is meant by meet-in-the-middle attack in double DES? Explain -Nov-17
Unit:3
TOPIC:1: Multiple encryption and triple DES

1 Explain the triple DES scheme with two keys and write about proposed attacks on 4
3DES.- (May-12)
2 Explain how DES(Data Encryption standard) algorithm observes Fiestel structure. 7
Explain key generation and use of S-box in DES algorithm. May 2019

TOPIC:2: Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback
mode, Output Feedback mode, Counter mode

1 List various modes of operations of block cipher. Explain any three of them briefly.- 7
(Nov-11). List and explain various block cipher modes of operation with the help of
diagram.- ( Jan-13)

2 Why mode of operation is defined? Explain the simplest mode for block cipher modes 4
of operation?- (May-11)
3 Why mode of operation is defined? Explain the block cipher modes of operation?- 7
(Nov-13)
Explain Modes of Operation.- (Nov-14) May- 17
4 Explain cipher feedback mode of operation. - (May-15) May - 17 4
5 Explain working of ECB.Why ECB (Electronic code book) is rarely used to encrypt
message? May 2019
6 Why CFB(Cipher feedback mode) encrypted messages are less subject to tampering than
OFB(Output feedback mode)? May 2019
Unit:4
TOPIC:1: Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and
security

1 Define congruent modulo. Also Find integer x such that 1.5x≡4 (mod 3) 2.7x≡6 (mod 5) 7
(Jan-13)
2 Define the following terms briefly. Relative Prime Number- (Nov-11) 1
3 i) Find GCD of 1970 and 1066 using Euclid algorithm. ii) Find all primitive roots of a 7
number 7.- (Jan-13)
4 Write the Euclid’s algorithm and show the steps of Euclid’s algorithm to find 4
gcd(1970,1066).- (May-11)
5 With the help of example explain how can we find out GCD of two numbers using 7
Euclid Algorithm. - (May-14)
6 Write extended Euclidean algorithm.- (Nov-11) 3
7 Explain Euler’s totient function.- (May-12, May-13) 4,3
8 Write two properties of prime numbers.- (May-13) 4
9 Find Euler’s Totient function for n=13,n=14.
10 What is public key cryptography? Compare public with conventional 7
cryptography.- (Jan-13) NOv-2017
11 Write the differences between conventional encryption and public key 3
encryption.- (May-11)
12 Compare public and Private key Cryptography. Also list various algorithms for each. 7
- (May-14)
13 Compare conventional encryption with public key encryption.- (Nov-13) 4
14 What is a trap-door one-way function? What is its importance in public key 3
cryptography?- (Nov-13)
15 Explain the principle of public key cryptosystem and show how it differs from 4
conventional encryption techniques.- (May-11)
16 Give the steps of RSA algorithm.- (Nov-11) Des 2018 4
17 Explain RSA algorithm. - (May-14) May-17 Nov-17 May-18 7
18 Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on 7
RSA.- (Jan-13)
19 Define the types of cryptanalytic attacks. Which cryptnalytic attack can occur on RSA 4
algorithm?- (May-13)
20 Explain RSA algorithm and list the possible approaches to attacking it. - (Nov- 13). 4
Write four possible approaches to attacking the RSA algorithm.- (May-12)
Elaborate various kinds of attacks on RSA algorithm.-(Nov-14) 7
7
21 In a public key system using RSA, the cipher text intercepted is C=10 which is sent to 4
the user whose public key is e=5, n=35. What is the plaintext M?- (May-11)
22 Calculate ciphertext in case of RSA if p=3,q=11,e=3,M=5.- (May-13) May 2019 3
23 Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, 4,3
M=5.- (May-11, Nov-13)
24 Evaluate Euler’s totient function (37). Φ - (May-15) 3
25 The encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and 4
public key (e) is 3. Calculate the decryption key and Calculate the ciphertext if the given
plaintext is 7. - (Dec-15)
26 Apply Euclid’s algorithm and find greatest common divisor of 28, 42. - (Dec-15) 3
27 Explain RSA algorithm with example. - (May-16) 7
28 P and Q are two prime numbers. P=7, and Q=17. Take public key E=5. If plain text value
is 6, then what will be cipher text value according to RSA algorithm? - Nov 2016
29 Explain the three approaches to attack RSA mathematically 3
TOPIC:2: Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack

1 Briefly explain Diffie-Hellman key exchage with example - (May-11) 7


Write and explain the Diffie-Hellman key exchange algorithm.- (May12, Jan-13)
Explain Deffie Hellman key exchange scheme in detail- (Nov-11)
What is primitive root? Explain Diffi-Hellman key exchange algorithm with proper
example.- (Nov-14)
Explain Diffie – Hellman key exchange. - (May-15) May-18
2 Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle 7
attack? Justify.- (Nov-13) Dec 2018
3 Briefly explain the Diffie-Hellman key exchange.- ( May-11) Nov-16 May 2017 4
4 Write Diffie Hellman key exchange algorithm. Explain man-in-the middle attack on this 7
Diffie Hellman key exchange.- ( May-13)
5 Explain Diffie - Hellman key exchange algorithm. - (May-16) 7
6 For Diffie-Hellman algorithm, two publicaly known numbers are prime number 353 and
primitive root of it is 3. A selects the random integer 97 and B selects 233. Compute the
public key of A and B. Also compute common secret key.
Unit:5
TOPIC:1: Cryptographic Hash Functions, their applications, Simple hash
functions, its requirements and security
1 Illustrate variety of ways in which hash code can be used to provide message 7
authentication- (May-11)
2 Explain different characteristics of hash function.- (Nov-11) 4
3 Explain Following properties of hash function. 1)one way property 2) Weak collision 7
resistance 3) Compression Function in hash algorithm - (May-11)
4 What is the difference between weak and strong collision resistance?- (Nov-13) 3
5 Write the properties of hash functions. - (May-15) 4
6 Hashing dose not ensures integrity of message in network communication” –
Justify your answer with suitable example.- (Nov-16)
7 Differentiate between hashing and encryption. What are the practical applications of
hashing? Compare MD5 and SHA1 hashing algorithms.- Nov-16
8 Write requirement of hash function and briefly explain simple hash function?- May-17
9 What is the difference between weak and strong collision resistance? Consider the hash 4
functions based on cipher block chaining, What kind of attack can occur on this?
TOPIC:2: Hash functions based on Cipher Block Chaining, Secure Hash
Algorithm (SHA)

1 Explain the general structure of secure hash functions - (Nov-11) 3


2 Explain the operation of secure hash algorithm on 512 bit block.- (May-13) 7
3 What characteristics are needed in a secure hash function?- (Nov-13) 4
4 Explain SHA512 Algorithm.- (Nov-14) 7
5 What characteristics are needed in a secure hash function? - (Dec-15) 4
6 Enlist the practical applications of hashing.- Nov-17
7 Explain the logic of SHA(Secure Hash Algorithm 7
Unit:6
TOPIC:1: Message Authentication Codes, its requirements and security

1 What is the need for message authentication? List various techniques used for 7
Authentication. Explain anyone.- (Jan-13)
2 Is message authentication code same as encryption? How message authentication can be 3
done by message authentication code?- (May-13)
3 How message authentication code can be used to achieve message authentication and 7
confidentiality? - (May-15)
4 How following can be achieved with message authentication code (MAC)? 4
a. Message authentication
b. Message authentication and confidentiality - (Dec-13)
5 What is MAC? Explain HMAC. - (May-16) 7

TOPIC:2: MACs based on Hash Functions, Macs based on Block Ciphers

1 What is cryptographic checksum or message authentication code? Describe the three 7


situation in which message authentication code is used.- (May-11)
2 Explain briefly basic uses of MAC.- (Nov-11) 4
3 What is MAC? Why it is required? Explain HMAC algorithm.- (Nov-13) May 2019 7
4 Illustrate the overall operation of HMAC. Define the terms - (May-12) May-18 7
5 Write a short note on Message Authentication Code. Nov-16
6 State the basic difference(s) between message authentication code and hash function. Nov-
2017
7 Is a message authentication code(MAC) function is similar to encryption. Does MAC
provide authentication or confidentiality? Justify your answer
Unit:7
TOPIC:1: Digital Signature, its properties, requirements and security, various
digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm

1 Write the digital signature algorithm - (May-11) May -17 7


Explain digital signature algorithm in detail - (Nov-11) Nov-16
2 Write a note: Digital Signature - ( Jan-13) Nov-2017 May-18 3.5
3 What is Digital Signature? Explain its use with the help of example. - (May-14) 7
4 List the security services provided by digital signature. Write and explain the Digital 7
Signature Algorithm.- (Nov-13)
5 Describe Elgamal digital signature 7
6 What is the principle of digital signature algorithm(DSA). How a user can create a 7d
signature using DSA? Explain the signing and verifying function in DSA. May 2019
Unit:8
TOPIC:1: Key management and distribution, symmetric key distribution using
symmetric and asymmetric encryptions, distribution of public keys

1 Write the key distribution scenario in which each user shares a unique master key with 3
key distribution center.- (May-11).
2 Explain the key distribution scenario and write how does decentralized key control 7
work?- (May-12)
3 What is KDC? With the help of diagram explain how KDC do key distribution.- 7
(Jan-13) Dec 2018
4 What is a nonce in key distribution scenario? Explain the key distribution scenario if A 7
wishes to establish logical connection with B. A and B both have a master key which
they share with itself and key distribution center.- (May-13)
5 Explain different key distribution techniques.- (Nov-11) 7
6 Discus the ways in which public keys can be distributed to two communication 7
parties.- (Nov-13)
7 List and Explain Various Key management techniques. - (May-14) 7
Explain Key Distribution Methods.- (Nov-14)
8 List and explain four general categories of schemes for the distribution of public 7
keys.- (May-12) May-2017
9 Which techniques are used for the distribution of public keys? - (May-15) May-18 7
10 In symmetric encryption, Describe the ways in which key distribution can be achieved
between two parties A and B? - (Dec-15)
11 Explain various general categories of schemes for the distribution of public keys.
TOPIC:2: X.509 certificates, Public key infrastructure

1 Explain X.509 authentication service. - (Nov-11) MAy-2017 7


2 What is the purpose of X.509 standard? - (Dec-15) May 2019 3
3 Explain the one –way and two way authentication in X.509.- (May-12) 7
4 Explain Public key Infrastructure and Public Key Certificates.- Nov -16

Unit:9
TOPIC:1: Remote user authentication with symmetric and asymmetric encryption,
Kerberos

1 Explain Kerberos in detail.- (Nov-11) May 2017 7


Explain Kerberos Authentication System.- (Nov-14) May-2018
2 Explain the ticket granting server(TGS) scheme in Kerberos.- (May-12) 7
3 What problem was Kerberos designed to address? Briefly explain how session key is 7
distributed in Kerberos.- (Nov-13)
4 What four requirements were defined for Kerberos? - (Dec-15) May 2019 3
5 Explain authentication mechanism of Kerberos. - (May-16) 7
6 What is Kerberos? How Kerberos authenticates the users for authorized service access?
7 What is the difference between a session key and a master key? List four general 4
categories of schemes for the distribution of public keys. May 2019
Unit:10
TOPIC:1: Web Security threats and approaches, SSL architecture and protocol
Transport layer security, HTTPS and SSH

1 How we can achieve web Security? Explain with example. - (May-14) web security 7
threats- May -2017
2 Write a note: Secure Socket Layer - (Jan-13) May 2017 May-18 3.5
3 Explain the secure socket layer handshake protocol action.- ( May-13) 7
4 List and define the parameters that define secure socket layer connection state - 7
(Nov-13)
5 Which parameters define session state and which parameters define connection state in 7
SSL(secure socket Layer)?- (May-12)
6 Explain SSL protocol in detail - (Nov-11, Nov-14) 7
7 Define SSL session and SSL connection. Which parameters define session state and 7
connection state. - (May-15)
8 Define – SSL session and SSL connection. Which parameters are used to define SSL 7
state and SSL connection? - (Dec-15)
9 Write a short note on SSL. - (May-16) 7
10 Explain HTTPS in brief. Briefly discuss the working of SSL Record Protocol. - Nov-17
11 For what purpose Secure Shell(SSH) is useful? Briefly define SSH protocol. 3
Combine Questions:
1 Define the following terms briefly. i) Cryptography (Module-1) iii) MAC (Module-5) 3
iv) Digital Signature. (Module-7)- (Nov-11)
2 Write a note on followings (Any 4). i) Pretty Good Privacy (Module-8) ii) Kerberos 14
(Module-7) iii) Hill cipher (Module-1) iv) Elliptic curve cryptography (Module-4) v)
Diffi hellman key exchange (Module-3) vi) Message Authentication code (Module-5)
- (May-14)

You might also like