This document contains an internal examination from the Academy of Technology for the Cryptography & Network Security paper.
The examination contains two groups - Group A with 14 multiple choice questions testing knowledge of cryptographic concepts and algorithms. Group B contains short answer and explanation questions on topics like substitution and transposition ciphers, Diffie-Hellman and RSA key exchange, block cipher modes like CFB and OFB, the IDEA and SHA-1 algorithms, how MD5 works, digital signatures and certificates, SSL protocol, requirements of message digests, differences between SHTTP and SSL, and how encryption works in RC5.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
70 views2 pages
Academy of Technology
This document contains an internal examination from the Academy of Technology for the Cryptography & Network Security paper.
The examination contains two groups - Group A with 14 multiple choice questions testing knowledge of cryptographic concepts and algorithms. Group B contains short answer and explanation questions on topics like substitution and transposition ciphers, Diffie-Hellman and RSA key exchange, block cipher modes like CFB and OFB, the IDEA and SHA-1 algorithms, how MD5 works, digital signatures and certificates, SSL protocol, requirements of message digests, differences between SHTTP and SSL, and how encryption works in RC5.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
ACADEMY OF TECHNOLOGY
Internal Examination, Even Semester, 2023
Paper name: Cryptography & Network Security Paper Code: PEC-CS801B / PEC-IT801B Discipline: CSE/ IT Semester: 8th
Group A
1. MCQ type questions.
i. The process of writing the text as diagonals and reading it as sequence of rows is called as (a)Rail Fence Technique (b) Caesar Cipher (c) Mono-alphabetic Cipher (d) Homophonic Substitution Cipher ii. The mechanism of writing text as rows and reading as columns is called as_______ (a) Vernam Cipher (b) Caesar Cipher (c) Simple Columnar Transposition Technique (d) Homophonic Substitution Cipher iii. Vernam Cipher is also called as (a) Rail Fence Technique (b) One-time pad (c) Book Cipher (d) Running Key Cipher iv. DES encrypts blocks of ________ bits. (a) 32 (b) 56 (c) 64 (d) 128 v. There are _________ rounds in DES. (a) 8 (b) 10 c) 14 (d) 16 vi. _________is based on the IDEA algorithm. (a) S/MIME (b) PGP (c) SET (d) SSL vii. A _______ is used to verify the integrity of a message. (a) message digest (b) decryption algorithm (c) digital envelope (d) none of the above viii. _________ increases the redundancy of plain text. (a) Confusion (b) Diffusion (c) Both confusion and diffusion (d) Neither confusion nor diffusion ix. ______________ works on block mode. (a) CFB (b) OFB (c) CCB (d) CBC x. When two different message digests have the same value, it is called as (a) attack (b) collision (c) hash (d) none of the above xi. The final solution to the problem of key exchange is the use of_____ (a) passport (b) digital envelope (c) digital certificate (d) message digest xii. In asymmetric key cryptography,_______ keys are required per communicating (a) 2 (b) 3 (c) 4 (d) 5 xiii. If A and B want to communicate securely with each other, B must not know (a) A’s private key (b) A’s public key (c) B's private key (d) B's private key xiv. If A and B want to communicate securely with each other, B must not know (a) A’s private key (b) A’s public key (c) B's private key (d) B's private key
Group B
2. Explain substitution, transposition cipher and product cipher.
3. Describe Diffie-Hellman Symmetric Key Exchange algorithm. 4. What are CFB and OFB mode? Explain the significance of a network security model. 5. Explain RSA algorithm with example. In the public-key system using RSA, you intercept the cipher text CT=10 sent to a user whose public key is E=5, N=35. 6. Explain the principles of IDEA algorithm. 7. Explain the significance of SHA-1. 8. How MD5 algorithm works? 9. Why do you use digital signature? What are digital certificates? 10. What protocols contain SSL? 11. What are the key requirements of message digest? 12. How is SHTTP different from SSL? 13. Discuss how encryption happens in RC5.
Laurent Ouakil, Guy Pujolle - Telephonie Sur IP - H.323, SIP, MGCP, QoS Et Securite, Filtrage, ToIP Sur Wi-Fi, PBX Asterisk, Skype Et Autres Softphones, VoIP, Offre Multi-Play Des FAI, ...