0% found this document useful (0 votes)
70 views2 pages

Academy of Technology

This document contains an internal examination from the Academy of Technology for the Cryptography & Network Security paper. The examination contains two groups - Group A with 14 multiple choice questions testing knowledge of cryptographic concepts and algorithms. Group B contains short answer and explanation questions on topics like substitution and transposition ciphers, Diffie-Hellman and RSA key exchange, block cipher modes like CFB and OFB, the IDEA and SHA-1 algorithms, how MD5 works, digital signatures and certificates, SSL protocol, requirements of message digests, differences between SHTTP and SSL, and how encryption works in RC5.

Uploaded by

Ranajit Biswas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views2 pages

Academy of Technology

This document contains an internal examination from the Academy of Technology for the Cryptography & Network Security paper. The examination contains two groups - Group A with 14 multiple choice questions testing knowledge of cryptographic concepts and algorithms. Group B contains short answer and explanation questions on topics like substitution and transposition ciphers, Diffie-Hellman and RSA key exchange, block cipher modes like CFB and OFB, the IDEA and SHA-1 algorithms, how MD5 works, digital signatures and certificates, SSL protocol, requirements of message digests, differences between SHTTP and SSL, and how encryption works in RC5.

Uploaded by

Ranajit Biswas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ACADEMY OF TECHNOLOGY

Internal Examination, Even Semester, 2023


Paper name: Cryptography & Network Security Paper Code: PEC-CS801B / PEC-IT801B
Discipline: CSE/ IT Semester: 8th

Group A

1. MCQ type questions.


i. The process of writing the text as diagonals and reading it as sequence of rows is
called as
(a)Rail Fence Technique (b) Caesar Cipher
(c) Mono-alphabetic Cipher (d) Homophonic Substitution Cipher
ii. The mechanism of writing text as rows and reading as columns is called
as_______
(a) Vernam Cipher
(b) Caesar Cipher
(c) Simple Columnar Transposition Technique
(d) Homophonic Substitution Cipher
iii. Vernam Cipher is also called as
(a) Rail Fence Technique
(b) One-time pad
(c) Book Cipher
(d) Running Key Cipher
iv. DES encrypts blocks of ________ bits.
(a) 32 (b) 56 (c) 64 (d) 128
v. There are _________ rounds in DES.
(a) 8 (b) 10 c) 14 (d) 16
vi. _________is based on the IDEA algorithm.
(a) S/MIME (b) PGP (c) SET (d) SSL
vii. A _______ is used to verify the integrity of a message.
(a) message digest (b) decryption algorithm
(c) digital envelope (d) none of the above
viii. _________ increases the redundancy of plain text.
(a) Confusion (b) Diffusion (c) Both confusion and diffusion
(d) Neither confusion nor diffusion
ix. ______________ works on block mode.
(a) CFB (b) OFB (c) CCB (d) CBC
x. When two different message digests have the same value, it is called as
(a) attack (b) collision (c) hash (d) none of the above
xi. The final solution to the problem of key exchange is the use of_____
(a) passport (b) digital envelope
(c) digital certificate (d) message digest
xii. In asymmetric key cryptography,_______ keys are required per communicating
(a) 2 (b) 3 (c) 4 (d) 5
xiii. If A and B want to communicate securely with each other, B must not know
(a) A’s private key (b) A’s public key
(c) B's private key (d) B's private key
xiv. If A and B want to communicate securely with each other, B must not know
(a) A’s private key (b) A’s public key (c) B's private key (d) B's private key

Group B

2. Explain substitution, transposition cipher and product cipher.


3. Describe Diffie-Hellman Symmetric Key Exchange algorithm.
4. What are CFB and OFB mode? Explain the significance of a network security model.
5. Explain RSA algorithm with example. In the public-key system using RSA, you intercept the
cipher text CT=10 sent to a user whose public key is E=5, N=35.
6. Explain the principles of IDEA algorithm.
7. Explain the significance of SHA-1.
8. How MD5 algorithm works?
9. Why do you use digital signature? What are digital certificates?
10. What protocols contain SSL?
11. What are the key requirements of message digest?
12. How is SHTTP different from SSL?
13. Discuss how encryption happens in RC5.

You might also like