0% found this document useful (0 votes)
49 views3 pages

Mid Sem CNS FAQ

The document contains questions from chapters 1-4 of the subject Cryptography and Network Security. It includes questions related to terms in cryptography, encryption techniques like Caesar cipher, Playfair cipher and Hill cipher. It also includes questions on algorithms like DES, AES and RSA as well as key exchange algorithms like Diffie-Hellman.

Uploaded by

mayurikasoni0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views3 pages

Mid Sem CNS FAQ

The document contains questions from chapters 1-4 of the subject Cryptography and Network Security. It includes questions related to terms in cryptography, encryption techniques like Caesar cipher, Playfair cipher and Hill cipher. It also includes questions on algorithms like DES, AES and RSA as well as key exchange algorithms like Diffie-Hellman.

Uploaded by

mayurikasoni0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

NARNARAYAN SHASTRI INSTITUTE OF TECHNOLOGY

COMPUTER ENGINEERING DEPARTMENT


SEMESTER – 6TH
QUESTION BANK

SUBJECT NAME : Cryptography and Network Security

SUBJECT CODE : 3161606

Chapter-1

1) Explain the following terms in brief: i) Confidentiality ii) Integrity iii) Availability.
2) Define Cryptography and Cryptanalysis (MARKS-3)
3) Encrypt the following text with Caesar cipher: (Key=3) “Welcome to the course
Information and Network security”.
4) What is the difference between passive and active security threats? List and briefly
define categories of passive and active security attacks (marks-3)
5) Differentiate public key cryptography and symmetric key cryptography. Explain
any one substitution method for symmetric key cryptography with example.
6) Encrypt the following text with Caesar cipher: (Key=3) “Welcome to the course
Information and Network security”
7) Construct a Play fair matrix with the key “Trust” and encrypt the message “Be
confident in yourself”.
8) Apply Hill cipher approach to Encrypt the following message:
“Give me the top ten possible plaintexts”
Key for Hill cipher: 3
Key for Columnar(Advanced) Hill cipher: [1 4 2 5 3 ] (04)
NARNARAYAN SHASTRI INSTITUTE OF TECHNOLOGY

9). Find the inverse of 12 with extended Euclidean algorithm in Galois Field
79.(marks-4)
10) Write Euclid's algorithm and show the steps of Euclid’s algorithm to find
gcd(401,700).
11) List and explain transposition techniques in cryptography (marks-3)

Chapter-2

1) List down various modes of operations of block cipher and explain any three of
them briefly.
2) Differentiate Following: i)Stream Cipher and block cipher
3) Explain a single round of DES algorithm.
4) Justify how DES(Data Encryption standard) algorithm observes Fiestel structure.
Discuss use of S-box in DES algorithm.
5) Draw a detailed block diagram of encryption process in DES. Add appropriate
description. (07)
6) Explain Confusion & Diffusion (marks-4)
7) Explain Key Expansion in AES algorithm.
8) Explain four different stages of AES(Advance Encryption standard) structure.
(marks-7)

Chapter-3

1) Discuss attack on double DES? (03)


2) Briefly explain Triple DES with two keys. (03)
3) Enlist block cipher modes of operation. Justify the use of Electronic Codebook
(ECB) mode in Cipher Block Chaining (CBC) mode. (07)
4) Explain CFB algorithm mode with a diagram.
NARNARAYAN SHASTRI INSTITUTE OF TECHNOLOGY

Chapter-4
1) In a public key system using RSA, the cipher text intercepted is C=12 which is sent
to the user whose public key is e=5, n=35. What is the plaintext M?
2) Explain Diffie Hellman scheme with diagram. For DiffieHellman algorithm, two
publicly known numbers are prime number 11 and the primitive root of it is 2. A
selects the random integer 9 and B selects 4. Compute the public key of A and B.
Also compute common secret key(MARKS-7)
1

You might also like