5 - IS - Question Bank
5 - IS - Question Bank
CE Department
Year: 2022-2023
Prepared By:
17 Distinguish between passive and active security attacks? Define the type of Security 4 1
attack in each of the following cases: (i) A student breaks into a professor’s office to
obtain a copy of the next day’s test. (ii) A student gives a check for $10 to buy a used
book. Later she finds that the check was cashed for $100. (iii) A student sends hundreds
of e-mails per day to another student using a phony return e-mail address. (DEC – 21)
17 Explain one time pad cipher with example. - (May-16) what are practical issue of this 7 1
algorithm. - Nov 2016
18 Explain Attributes of Security.- 7 1
24 Construct a Playfair matrix with the key “engineering”. And encrypt the message “test this 4 1
Balloon” (DEC-21)
Unit:2
TOPIC:1: Stream ciphers and block ciphers, Block Cipher structure CO-1
10 List and explain various block cipher modes of operation with the help of diagram. 7 1
(DEC – 21)
11 Write difference between (i) block cipher and stream cipher (ii) monoalphabetic 4 1
cipher and polyalphabetic cipher (DEC – 21)
TOPIC:2: Data Encryption standard (DES) with example, strength of DES, Design CO-1,2
principles of block cipher
1
1 What is the purpose of S-boxes in DES? Explain the avalanche effect.- (May-11) Dec 3 1
2018
2 Explain the terms diffusion and confusion.- (May-11,Dec-15) 3 1
3 Define the terms diffusion and confusion. What is the purpose of S-box in DES? Explain 7 1
the avalanche effect in DES.- (Nov-13)
4 Draw and explain the single round of DES algorithm - (Jan-13) 7 2
Explain single round function of DES with suitable diagram.- (Nov-11)
Explain single round of DES algorithm. - (Dec-15)
5 Explain the DES encryption algorithm.- (May-12) May 2017 7 2
Explain DES algorithm with figure.-(Nov-14) Nov-2017
6 Explain Sub key generation Process in Simplified DES algorithm with Example.- 7 2
(Nov-14) Nov-16
7 Explain limitations of DES in detail. - (May-14) 7 2
8 Explain scheme for DES encryption. - (May-15) Dec 2018 7 2
9 With example explain function of s-box in DES. - (May-16) 7 2
10 Explain various steps of AES in short. - (May-16) Nov- 16 May 2017 Nov-2017 May-18, 7 2
19 Dec 2018
11 What are the essential ingredients of a symmetric cipher? - Nov-17 7 2
12 What is meant by meet-in-the-middle attack in double DES? Explain -Nov-17 7 2
13 What is the purpose of S-boxes in DES? Explain the avalanche effect. (DEC -21) 3 2
Unit:3
1 Explain the triple DES scheme with two keys and write about proposed attacks on 4 2
3DES.- (May-12)
2 Explain how DES(Data Encryption standard) algorithm observes Fiestel structure. 7 2
Explain key generation and use of S-box in DES algorithm. May 2019
3 Why not Double DES? What is a meet-in-the-middle attack? (DEC -21) 3 2
TOPIC:2: Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback CO-2
mode, Output Feedback mode, Counter mode
1 List various modes of operations of block cipher. Explain any three of them briefly.- 7 2
(Nov-11). List and explain various block cipher modes of operation with the help of
diagram.- ( Jan-13)
2 Why mode of operation is defined? Explain the simplest mode for block cipher modes 4 2
of operation?- (May-11)
3 Why mode of operation is defined? Explain the block cipher modes of operation?- 7 2
(Nov-13)
Explain Modes of Operation.- (Nov-14) May- 17
4 Explain cipher feedback mode of operation. - (May-15) May - 17 4 2
5 Explain the triple DES scheme with two keys. (DEC – 21) 3 2
6 Explain working of ECB.Why ECB (Electronic code book) is rarely used to encrypt 7 2
message? May 2019
7 Why CFB(Cipher feedback mode) encrypted messages are less subject to tampering than 7 2
OFB (Output feedback mode)? May 2019
8 What is a nonce? What is the difference between a session key and a master key? (DEC-21) 3 2
Unit:4
1 Define congruent modulo. Also Find integer x such that 1.5x≡4 (mod 3) 2.7x≡6 (mod 5) 7 3
(Jan-13)
2 Define the following terms briefly. Relative Prime Number- (Nov-11) 1 3
3 i) Find GCD of 1970 and 1066 using Euclid algorithm. ii) Find all primitive roots of a 7 3
number 7.- (Jan-13)
4 Write the Euclid’s algorithm and show the steps of Euclid’s algorithm to find 4 3
gcd(1970,1066).- (May-11)
5 With the help of example explain how can we find out GCD of two numbers using 7 3
Euclid Algorithm. - (May-14)
6 Write extended Euclidean algorithm.- (Nov-11) 3 3
7 Explain Euler’s totient function.- (May-12, May-13) 4,3 3
8 Write two properties of prime numbers.- (May-13) 4 3
9 Find Euler’s Totient function for n=13,n=14. 3
10 What is public key cryptography? Compare public with conventional 7 3
cryptography.- (Jan-13) NOv-2017
11 Write the differences between conventional encryption and public key 3 3
encryption.- (May-11)
12 Compare public and Private key Cryptography. Also list various algorithms for each. 7 3
- (May-14)
13 Compare conventional encryption with public key encryption.- (Nov-13) 4 3
14 What is a trap-door one-way function? What is its importance in public key 3 3
cryptography?- (Nov-13)
15 Explain the principle of public key cryptosystem and show how it differs from 4 3
conventional encryption techniques.- (May-11)
16 Give the steps of RSA algorithm.- (Nov-11) Des 2018 4 3
17 Explain RSA algorithm. - (May-14) May-17 Nov-17 May-18 7 3
18 Explain Encryption and decryption in RSA algorithm. Also discuss various attacks on 7 3
RSA.- (Jan-13)
19 Define the types of cryptanalytic attacks. Which cryptnalytic attack can occur on RSA 4 3
algorithm?- (May-13)
20 Explain RSA algorithm and list the possible approaches to attacking it. - (Nov- 13). 4 3
Write four possible approaches to attacking the RSA algorithm.- (May-12)
Elaborate various kinds of attacks on RSA algorithm.-(Nov-14) 7
7
21 In a public key system using RSA, the cipher text intercepted is C=10 which is sent to 4 3
the user whose public key is e=5, n=35. What is the plaintext M?- (May-11)
22 Calculate ciphertext in case of RSA if p=3,q=11,e=3,M=5.- (May-13) May 2019 3 3
23 Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7, 4,3 3
M=5.- (May-11, Nov-13)
24 Evaluate Euler’s totient function (37). Φ - (May-15) 3 3
25 The encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and 4 3
public key (e) is 3. Calculate the decryption key and Calculate the ciphertext if the given
plaintext is 7. - (Dec-15)
26 Apply Euclid’s algorithm and find greatest common divisor of 28, 42. - (Dec-15) 3 3
27 Explain RSA algorithm with example. - (May-16) 7 3
28 P and Q are two prime numbers. P=7, and Q=17. Take public key E=5. If plain text value 3
is 6, then what will be cipher text value according to RSA algorithm? - Nov 2016
29 Explain the three approaches to attack RSA mathematically 3 3
30 What is public key cryptography? What are the principal elements of a public-key cryptosystem? 3 3
(DEC-21)
31 Perform encryption and decryption using the RSA algorithm for p=5, q=11, e=3, M=9. (DEC -21) 4 3
32 Differentiate between Conventional encryption and Public-key encryption. 4 3
Unit:5
1 Illustrate variety of ways in which hash code can be used to provide message 7 4
authentication- (May-11)
2 Explain different characteristics of hash function.- (Nov-11) 4 4
3 Explain Following properties of hash function. 1)one way property 2) Weak collision 7 4
resistance 3) Compression Function in hash algorithm - (May-11)
4 What is the difference between weak and strong collision resistance?- (Nov-13) 3 4
5 Write the properties of hash functions. - (May-15) 4 4
6 Hashing dose not ensures integrity of message in network communication” – 4
Justify your answer with suitable example.- (Nov-16)
7 Differentiate between hashing and encryption. What are the practical applications of 4
hashing? Compare MD5 and SHA1 hashing algorithms.- Nov-16
8 Write requirement of hash function and briefly explain simple hash function?- May-17 4
9 What is the difference between weak and strong collision resistance? Consider the hash 4 4
functions based on cipher block chaining, What kind of attack can occur on this?
(DEC- 21)
TOPIC:2 CO-4
Algorithm (SHA)
4
1 Explain the general structure of secure hash functions - (Nov-11) 3 4
2 Explain the operation of secure hash algorithm on 512 bit block.- (May-13) 7 4
3 What characteristics are needed in a secure hash function?- (Nov-13) 4 4
4 Explain SHA512 Algorithm.- (Nov-14) 7 4
5 What characteristics are needed in a secure hash function? - (Dec-15) 4 4
6 Enlist the practical applications of hashing.- Nov-17 4
7 Explain the logic of SHA(Secure Hash Algorithm). 7 4
8 Differentiate between hashing and encryption. What are the practical applications of hashing? 4 4
(DEC -21)
1 What is the need for message authentication? List various techniques used for 7 4,5
Authentication. Explain anyone.- (Jan-13)
2 Is message authentication code same as encryption? How message authentication can be 3 4,5
done by message authentication code?- (May-13)
3 How message authentication code can be used to achieve message authentication and 7 4,5
confidentiality? - (May-15)
4 How following can be achieved with message authentication code (MAC)? 4 4,5
a. Message authentication
b. Message authentication and confidentiality - (Dec-13)
5 What is MAC? Explain HMAC. - (May-16) 7 4,5
6 What is message authentication code? What is the difference between a Message 7 4,5
authentication code and a one-way hash function? Write the basic uses of Message
authentication code. (DEC -21)
TOPIC:2: MACs based on Hash Functions, Macs based on Block Ciphers CO-4
Unit:7
TOPIC:1: Digital Signature, its properties, requirements and security, various CO-5
digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm
1 Write the digital signature algorithm - (May-11) May -17 7 5
Explain digital signature algorithm in detail - (Nov-11) Nov-16
2 Write a note: Digital Signature - ( Jan-13) Nov-2017 May-18 3. 5
5
3 What is Digital Signature? Explain its use with the help of example. - (May-14) 7 5
4 List the security services provided by digital signature. Write and explain the Digital 7 5
Signature Algorithm.- (Nov-13)
5 Describe Elgamal digital signature 7 5
6 What is the principle of digital signature algorithm (DSA). How a user can create a 7 5
signature using DSA? Explain the signing and verifying function in DSA. May 2019
7 Discuss generic model of digital signature process (DEC-21) 7 5
Unit:8
TOPIC:1: Key management and distribution, symmetric key distribution using CO-5
symmetric and asymmetric encryptions, distribution of public keys
1 Write the key distribution scenario in which each user shares a unique master key 3 5
with key distribution centre.- (May-11).
2 Explain the key distribution scenario and write how does decentralized key control 7 5
work?- (May-12) 5
3 What is KDC? With the help of diagram explain how KDC do key 7 5
distribution.- (Jan-13) Dec 2018
4 What is a nonce in key distribution scenario? Explain the key distribution scenario if A 7 5
wishes to establish logical connection with B. A and B both have a master key
which they share with itself and key distribution center.- (May-13)
5 Explain different key distribution techniques.- (Nov-11) 7 5
6 Discus the ways in which public keys can be distributed to two 7 5
communication parties.- (Nov-13)
7 List and Explain Various Key management techniques. - (May-14) Explain Key 7 5
Distribution Methods.- (Nov-14)
8 List and explain four general categories of schemes for the distribution of 7 5
public keys.- (May-12) May-2017
9 Which techniques are used for the distribution of public keys? - (May-15) May-18 7 5
10 In symmetric encryption, Describe the ways in which key distribution can be 5
achieved between two parties A and B? - (Dec-15)
11 Explain various general categories of schemes for the distribution of public keys. 7 5
12 What do you mean by key distribution? Give at least one method for key distribution with 7 5
proper illustration. (DEC -21)
Unit:9
TOPIC:1: Remote user authentication with symmetric and asymmetric encryption, CO-5
Kerberos