0% found this document useful (0 votes)
59 views12 pages

5 - IS - Question Bank

The document contains a question bank for an Information Security course. It includes questions related to topics like symmetric and asymmetric cryptography, block and stream ciphers, DES algorithm, AES algorithm, Playfair cipher, Hill cipher, Rail fence cipher and one time pad. The questions are categorized into different units and topics with marks allocation for each question.

Uploaded by

sunnyshah26sp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views12 pages

5 - IS - Question Bank

The document contains a question bank for an Information Security course. It includes questions related to topics like symmetric and asymmetric cryptography, block and stream ciphers, DES algorithm, AES algorithm, Playfair cipher, Hill cipher, Rail fence cipher and one time pad. The questions are categorized into different units and topics with marks allocation for each question.

Uploaded by

sunnyshah26sp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SAL Engineering & Technical Institute

CE Department

Information Security (3170720)


Question Bank

Year: 2022-2023

Prepared By:

Prof. Akash Bhatt


Sr. Questions Ma CO
No rks
Unit:1
TOPIC:1: Symmetric Cipher Model, Cryptography, Crypt-analysis and Attacks CO-1

1 Define Cryptography and Crypt-analysis. Draw and explain conventional cryptosystem. 7 1


- (Jan-13)
2 Differentiate Symmetric and Asymmetric key cryptography.- (Nov-11) what are 3 1
challenges of symmetric key cryptography? List out various symmetric key algorithms
- Nov 2016
4 Explain the Conventional security model used for Information security. - (May- 7 1
14)
5 Define the terms threat and attack. List and briefly define categories of security 4 1
attacks.- (Nov-13)
6 List and briefly define the security services. OR What is security Services? Explain any 3,7 1
three types of security services. - (Nov-13, Nov-14)
7 What is Security mechanism? List and explain various security mechanism.- 7 1
(May-14)
8 What is the objective of attacking an encryption system? Write the two approaches to 7 1
attack a conventional encryption scheme.- (May-12)
9 Explain Various types of Attack on Computer System.- (May-14) 7 1
10 When an encryption scheme is said to be unconditionally secure and computationally 3 1
secure? - (May-15)
11 What is the difference between passive and active security threats? List and briefly 7 1
define categories of passive and active security attacks. - (Dec-15)
12 Give examples of replay attacks. List three general approaches for dealing with replay 3 1
attacks. - (Dec-15)
13 Explain data confidentiality, data authentication and data integrity. - (May-16) May-2018 7 1
14 Write a short note on: Cipher text only attack. Timing attack 7 1
15 Discuss the following terms in brief: Passive attack - Cryptanalysis- (Nov-17) 7 1
16 Define the following terms: 3 1
(i) Non-repudiation (ii) Data integrity (iii) Confidentiality (DEC -21)

17 Distinguish between passive and active security attacks? Define the type of Security 4 1
attack in each of the following cases: (i) A student breaks into a professor’s office to
obtain a copy of the next day’s test. (ii) A student gives a check for $10 to buy a used
book. Later she finds that the check was cashed for $100. (iii) A student sends hundreds
of e-mails per day to another student using a phony return e-mail address. (DEC – 21)

TOPIC: Substitution and Transposition techniques CO-1


2
1 What is Play fair cipher with suitable example. - (May-14) May-2018 7 1
2 Let the keyword in playfail cipher is “keyword”. Encrypt a message “come to the 7 1
window” using playfair cipher.- (Jan-13)
3 Construct a playfair matrix with the key “occurrence”. Generate the cipher text for the 3 1
plaintext “Tall trees” OR Construct 5 X 5 playfair matrix for the keyword
“OCCURANCE”. - (May-11, Nov-11, Nov-13)
4 Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair matrix with the 3 1
key “moonmission” and encrypt the message “greet”.- (May-13)
5 Define the Caesar cipher.- (May-12) 3 1
6 Construct a Playfair matrix with the key “engineering”. And encrypt the message “test 4 1
this process”.- (May-12)
7 Use playfair algorithm with key “monarchy” and encrypt the text “jazz”. - (May- 4 1
15)
8 Using playfair cipher encrypt the plaintext “Why, don’t you?”. Use the key “keyword”. 4 1
- (Dec-15)
9 Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.- 7 1
(Nov-13) May-2018
10 Explain Vegenere Cipher.- (Nov-14) 7 1

11 Which type of substitution is called monoalphabetic substitution cipher? - (May- 1 1


15)
12 Which two principal methods are used in substitution ciphers to lessen the extent to 2 1
which the structure of the plaintext survives in the ciphertext? - (May-15)
13 3 1
Encrypt the message “Good morning” using the Hill Cipher with the key
- (May-11)

14 Explain generation of encryption matrix in play fair cipher. - (May-16) 7 1

15 Explain the one time pad scheme.- (May-12) May-18 3 1

16 Explain rail fence Cipher technique. - (May-16) May 2019 7 1

17 Explain one time pad cipher with example. - (May-16) what are practical issue of this 7 1
algorithm. - Nov 2016
18 Explain Attributes of Security.- 7 1

19 Briefly explain Classical Encryption Techniques. - 7 1

20 Briefly explain Transposition Encryption Techniques.- Nov-2017 7 1

21 Compare Steganography with encryption techniques.- 7 1

22 Write a short note on Hill cipher-(Nov -16) Nov-2017 7 1

23 Difference between substitution and transposition technique. - (May 2017) 7 1

24 Construct a Playfair matrix with the key “engineering”. And encrypt the message “test this 4 1
Balloon” (DEC-21)
Unit:2

TOPIC:1: Stream ciphers and block ciphers, Block Cipher structure CO-1

1 Define Block Cipher. Explain Design Principles of block cipher.- (Nov-14) 7 1


2 Draw and explain Feistel’s structure for encryption and decryption.- (Nov-11) 7 1
3 The exact realization of Feistel network depends on the choice of 3 1
which parameters?- (May-12)
4 List and explain various types of attacks on encrypted message.- (Jan-13, May- 7 1
14)
5 Explain the various types of cryptanalytic attack, based on the amount of information 4 1
known to the cryptanalyst.- (May-11)
6 Explain Cryptanalysis. Discuss any one technique for it. - (May-14) 7 1
7 Define the term cryptanalysis. Explain various types of cryptanalytic attacks. 7 1
- (Dec-15)
8 What are the differences between stream cipher and block cipher?- Nov-2017 1
Dec 2018
9 Which two methods are used to frustrate statistical cryptanalysis? May 2019 3 1

10 List and explain various block cipher modes of operation with the help of diagram. 7 1
(DEC – 21)
11 Write difference between (i) block cipher and stream cipher (ii) monoalphabetic 4 1
cipher and polyalphabetic cipher (DEC – 21)
TOPIC:2: Data Encryption standard (DES) with example, strength of DES, Design CO-1,2
principles of block cipher
1
1 What is the purpose of S-boxes in DES? Explain the avalanche effect.- (May-11) Dec 3 1
2018
2 Explain the terms diffusion and confusion.- (May-11,Dec-15) 3 1
3 Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain 7 1
the avalanche effect in DES.- (Nov-13)
4 Draw and explain the single round of DES algorithm - (Jan-13) 7 2
Explain single round function of DES with suitable diagram.- (Nov-11)
Explain single round of DES algorithm. - (Dec-15)
5 Explain the DES encryption algorithm.- (May-12) May 2017 7 2
Explain DES algorithm with figure.-(Nov-14) Nov-2017
6 Explain Sub key generation Process in Simplified DES algorithm with Example.- 7 2
(Nov-14) Nov-16
7 Explain limitations of DES in detail. - (May-14) 7 2
8 Explain scheme for DES encryption. - (May-15) Dec 2018 7 2
9 With example explain function of s-box in DES. - (May-16) 7 2
10 Explain various steps of AES in short. - (May-16) Nov- 16 May 2017 Nov-2017 May-18, 7 2
19 Dec 2018
11 What are the essential ingredients of a symmetric cipher? - Nov-17 7 2
12 What is meant by meet-in-the-middle attack in double DES? Explain -Nov-17 7 2
13 What is the purpose of S-boxes in DES? Explain the avalanche effect. (DEC -21) 3 2

Unit:3

TOPIC:1: Multiple encryption and triple DES CO-2

1 Explain the triple DES scheme with two keys and write about proposed attacks on 4 2
3DES.- (May-12)
2 Explain how DES(Data Encryption standard) algorithm observes Fiestel structure. 7 2
Explain key generation and use of S-box in DES algorithm. May 2019
3 Why not Double DES? What is a meet-in-the-middle attack? (DEC -21) 3 2

TOPIC:2: Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback CO-2
mode, Output Feedback mode, Counter mode

1 List various modes of operations of block cipher. Explain any three of them briefly.- 7 2
(Nov-11). List and explain various block cipher modes of operation with the help of
diagram.- ( Jan-13)

2 Why mode of operation is defined? Explain the simplest mode for block cipher modes 4 2
of operation?- (May-11)
3 Why mode of operation is defined? Explain the block cipher modes of operation?- 7 2
(Nov-13)
Explain Modes of Operation.- (Nov-14) May- 17
4 Explain cipher feedback mode of operation. - (May-15) May - 17 4 2
5 Explain the triple DES scheme with two keys. (DEC – 21) 3 2
6 Explain working of ECB.Why ECB (Electronic code book) is rarely used to encrypt 7 2
message? May 2019
7 Why CFB(Cipher feedback mode) encrypted messages are less subject to tampering than 7 2
OFB (Output feedback mode)? May 2019
8 What is a nonce? What is the difference between a session key and a master key? (DEC-21) 3 2

Unit:4

TOPIC:1: Public Key Cryptosystems with Applications, Requirements and CO-3


Cryptanalysis, RSA algorithm, its computational aspects and
security

1 Define congruent modulo. Also Find integer x such that 1.5x≡4 (mod 3) 2.7x≡6 (mod 5) 7 3
(Jan-13)
2 Define the following terms briefly. Relative Prime Number- (Nov-11) 1 3
3 i) Find GCD of 1970 and 1066 using Euclid algorithm. ii) Find all primitive roots of a 7 3
number 7.- (Jan-13)
4 Write the Euclid’s algorithm and show the steps of Euclid’s algorithm to find 4 3
gcd(1970,1066).- (May-11)
5 With the help of example explain how can we find out GCD of two numbers using 7 3
Euclid Algorithm. - (May-14)
6 Write extended Euclidean algorithm.- (Nov-11) 3 3
7 Explain Euler’s totient function.- (May-12, May-13) 4,3 3
8 Write two properties of prime numbers.- (May-13) 4 3
9 Find Euler’s Totient function for n=13,n=14. 3
10 What is public key cryptography? Compare public with conventional 7 3
cryptography.- (Jan-13) NOv-2017
11 Write the differences between conventional encryption and public key 3 3
encryption.- (May-11)
12 Compare public and Private key Cryptography. Also list various algorithms for each. 7 3
- (May-14)
13 Compare conventional encryption with public key encryption.- (Nov-13) 4 3
14 What is a trap-door one-way function? What is its importance in public key 3 3
cryptography?- (Nov-13)
15 Explain the principle of public key cryptosystem and show how it differs from 4 3
conventional encryption techniques.- (May-11)
16 Give the steps of RSA algorithm.- (Nov-11) Des 2018 4 3
17 Explain RSA algorithm. - (May-14) May-17 Nov-17 May-18 7 3
18 Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on 7 3
RSA.- (Jan-13)
19 Define the types of cryptanalytic attacks. Which cryptnalytic attack can occur on RSA 4 3
algorithm?- (May-13)
20 Explain RSA algorithm and list the possible approaches to attacking it. - (Nov- 13). 4 3
Write four possible approaches to attacking the RSA algorithm.- (May-12)
Elaborate various kinds of attacks on RSA algorithm.-(Nov-14) 7
7
21 In a public key system using RSA, the cipher text intercepted is C=10 which is sent to 4 3
the user whose public key is e=5, n=35. What is the plaintext M?- (May-11)
22 Calculate ciphertext in case of RSA if p=3,q=11,e=3,M=5.- (May-13) May 2019 3 3
23 Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, 4,3 3
M=5.- (May-11, Nov-13)
24 Evaluate Euler’s totient function (37). Φ - (May-15) 3 3
25 The encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and 4 3
public key (e) is 3. Calculate the decryption key and Calculate the ciphertext if the given
plaintext is 7. - (Dec-15)
26 Apply Euclid’s algorithm and find greatest common divisor of 28, 42. - (Dec-15) 3 3
27 Explain RSA algorithm with example. - (May-16) 7 3
28 P and Q are two prime numbers. P=7, and Q=17. Take public key E=5. If plain text value 3
is 6, then what will be cipher text value according to RSA algorithm? - Nov 2016
29 Explain the three approaches to attack RSA mathematically 3 3
30 What is public key cryptography? What are the principal elements of a public-key cryptosystem? 3 3
(DEC-21)
31 Perform encryption and decryption using the RSA algorithm for p=5, q=11, e=3, M=9. (DEC -21) 4 3
32 Differentiate between Conventional encryption and Public-key encryption. 4 3

TOPIC:2: Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack CO-3

1 Briefly explain Diffie-Hellman key exchage with example - (May-11) 7 3


Write and explain the Diffie-Hellman key exchange algorithm.- (May12, Jan-13)
Explain Deffie Hellman key exchange scheme in detail- (Nov-11)
What is primitive root? Explain Diffi-Hellman key exchange algorithm with proper
example.- (Nov-14)
Explain Diffie – Hellman key exchange. - (May-15) May-18
2 Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle 7 3
attack? Justify.- (Nov-13) Dec 2018
3 Briefly explain the Diffie-Hellman key exchange.- ( May-11) Nov-16 May 2017 4 3
4 Write Diffie Hellman key exchange algorithm. Explain man-in-the middle attack on this 7 3
Diffie Hellman key exchange.- ( May-13)
5 Explain Diffie - Hellman key exchange algorithm. - (May-16) 7 3
6 For Diffie-Hellman algorithm, two publicaly known numbers are prime number 353 and 3
primitive root of it is 3. A selects the random integer 97 and B selects 233. Compute the
public key of A and B. Also compute common secret key.
7 Explain Diffie Hellman key exchange algorithm with example. (DEC-21) 7 3

Unit:5

TOPIC:1: Cryptographic Hash Functions, their applications, Simple hash CO-4


functions, its requirements and security

1 Illustrate variety of ways in which hash code can be used to provide message 7 4
authentication- (May-11)
2 Explain different characteristics of hash function.- (Nov-11) 4 4
3 Explain Following properties of hash function. 1)one way property 2) Weak collision 7 4
resistance 3) Compression Function in hash algorithm - (May-11)
4 What is the difference between weak and strong collision resistance?- (Nov-13) 3 4
5 Write the properties of hash functions. - (May-15) 4 4
6 Hashing dose not ensures integrity of message in network communication” – 4
Justify your answer with suitable example.- (Nov-16)
7 Differentiate between hashing and encryption. What are the practical applications of 4
hashing? Compare MD5 and SHA1 hashing algorithms.- Nov-16
8 Write requirement of hash function and briefly explain simple hash function?- May-17 4
9 What is the difference between weak and strong collision resistance? Consider the hash 4 4
functions based on cipher block chaining, What kind of attack can occur on this?
(DEC- 21)
TOPIC:2 CO-4
Algorithm (SHA)
4
1 Explain the general structure of secure hash functions - (Nov-11) 3 4
2 Explain the operation of secure hash algorithm on 512 bit block.- (May-13) 7 4
3 What characteristics are needed in a secure hash function?- (Nov-13) 4 4
4 Explain SHA512 Algorithm.- (Nov-14) 7 4
5 What characteristics are needed in a secure hash function? - (Dec-15) 4 4
6 Enlist the practical applications of hashing.- Nov-17 4
7 Explain the logic of SHA(Secure Hash Algorithm). 7 4
8 Differentiate between hashing and encryption. What are the practical applications of hashing? 4 4
(DEC -21)

9 Discuss message digest generation using SHA-512. (DEC -21) 4 4


Unit:6

TOPIC:1: Message Authentication Codes, its requirements and security CO-4,5

1 What is the need for message authentication? List various techniques used for 7 4,5
Authentication. Explain anyone.- (Jan-13)
2 Is message authentication code same as encryption? How message authentication can be 3 4,5
done by message authentication code?- (May-13)
3 How message authentication code can be used to achieve message authentication and 7 4,5
confidentiality? - (May-15)
4 How following can be achieved with message authentication code (MAC)? 4 4,5
a. Message authentication
b. Message authentication and confidentiality - (Dec-13)
5 What is MAC? Explain HMAC. - (May-16) 7 4,5
6 What is message authentication code? What is the difference between a Message 7 4,5
authentication code and a one-way hash function? Write the basic uses of Message
authentication code. (DEC -21)

TOPIC:2: MACs based on Hash Functions, Macs based on Block Ciphers CO-4

1 What is cryptographic checksum or message authentication code? Describe the three 7 4


situation in which message authentication code is used.- (May-11)
2 Explain briefly basic uses of MAC.- (Nov-11) 4 4
3 What is MAC? Why it is required? Explain HMAC algorithm.- (Nov-13) May 2019 7 4
4 Illustrate the overall operation of HMAC. Define the terms - (May-12) May-18 7 4
5 Write a short note on Message Authentication Code. Nov-16 4
6 State the basic difference(s) between message authentication code and hash function. Nov 4
2017
7 Is a message authentication code(MAC) function is similar to encryption. Does MAC 4
provide authentication or confidentiality? Justify your answer. (DEC – 21)

Unit:7

TOPIC:1: Digital Signature, its properties, requirements and security, various CO-5
digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm
1 Write the digital signature algorithm - (May-11) May -17 7 5
Explain digital signature algorithm in detail - (Nov-11) Nov-16
2 Write a note: Digital Signature - ( Jan-13) Nov-2017 May-18 3. 5
5
3 What is Digital Signature? Explain its use with the help of example. - (May-14) 7 5

4 List the security services provided by digital signature. Write and explain the Digital 7 5
Signature Algorithm.- (Nov-13)
5 Describe Elgamal digital signature 7 5

6 What is the principle of digital signature algorithm (DSA). How a user can create a 7 5
signature using DSA? Explain the signing and verifying function in DSA. May 2019
7 Discuss generic model of digital signature process (DEC-21) 7 5
Unit:8

TOPIC:1: Key management and distribution, symmetric key distribution using CO-5
symmetric and asymmetric encryptions, distribution of public keys

1 Write the key distribution scenario in which each user shares a unique master key 3 5
with key distribution centre.- (May-11).
2 Explain the key distribution scenario and write how does decentralized key control 7 5
work?- (May-12) 5
3 What is KDC? With the help of diagram explain how KDC do key 7 5
distribution.- (Jan-13) Dec 2018
4 What is a nonce in key distribution scenario? Explain the key distribution scenario if A 7 5
wishes to establish logical connection with B. A and B both have a master key
which they share with itself and key distribution center.- (May-13)
5 Explain different key distribution techniques.- (Nov-11) 7 5
6 Discus the ways in which public keys can be distributed to two 7 5
communication parties.- (Nov-13)
7 List and Explain Various Key management techniques. - (May-14) Explain Key 7 5
Distribution Methods.- (Nov-14)
8 List and explain four general categories of schemes for the distribution of 7 5
public keys.- (May-12) May-2017
9 Which techniques are used for the distribution of public keys? - (May-15) May-18 7 5
10 In symmetric encryption, Describe the ways in which key distribution can be 5
achieved between two parties A and B? - (Dec-15)
11 Explain various general categories of schemes for the distribution of public keys. 7 5
12 What do you mean by key distribution? Give at least one method for key distribution with 7 5
proper illustration. (DEC -21)

TOPIC:2: X.509 certificates, Public key infrastructure CO-5

1 Explain X.509 authentication service. - (Nov-11) MAy-2017 7 5


2 What is the purpose of X.509 standard? - (Dec-15) May 2019 3 5
3 Explain the one –way and two way authentication in X.509.- (May-12) 7 5
4 Explain Public key Infrastructure and Public Key Certificates.- Nov -16 7 5
5 Discuss X.509 Certificates. (DEC -21) 7 5

Unit:9
TOPIC:1: Remote user authentication with symmetric and asymmetric encryption, CO-5
Kerberos

1 Explain Kerberos in detail.- (Nov-11) May 2017 7 5


Explain Kerberos Authentication System.- (Nov-14) May-2018
2 Explain the ticket granting server(TGS) scheme in Kerberos.- (May-12) 7 5
3 What problem was Kerberos designed to address? Briefly explain how session key is 7 5
distributed in Kerberos.- (Nov-13)
4 What four requirements were defined for Kerberos? - (Dec-15) May 2019 3 5
5 Explain authentication mechanism of Kerberos. - (May-16) 7 5
6 What is Kerberos? How Kerberos authenticates the users for authorized service access? 5
7 What is the difference between a session key and a master key? List four general 4 5
categories of schemes for the distribution of public keys. May 2019
8 Explain Kerberos in detail. (DEC -21). 7 5

You might also like