Mid Sem CNS FAQ
Mid Sem CNS FAQ
Chapter-1
1) Explain the following terms in brief: i) Confidentiality ii) Integrity iii) Availability.
2) Define Cryptography and Cryptanalysis (MARKS-3)
3) Encrypt the following text with Caesar cipher: (Key=3) “Welcome to the course
Information and Network security”.
4) What is the difference between passive and active security threats? List and briefly
define categories of passive and active security attacks (marks-3)
5) Differentiate public key cryptography and symmetric key cryptography. Explain
any one substitution method for symmetric key cryptography with example.
6) Encrypt the following text with Caesar cipher: (Key=3) “Welcome to the course
Information and Network security”
7) Construct a Play fair matrix with the key “Trust” and encrypt the message “Be
confident in yourself”.
8) Apply Hill cipher approach to Encrypt the following message:
“Give me the top ten possible plaintexts”
Key for Hill cipher: 3
Key for Columnar(Advanced) Hill cipher: [1 4 2 5 3 ] (04)
NARNARAYAN SHASTRI INSTITUTE OF TECHNOLOGY
9). Find the inverse of 12 with extended Euclidean algorithm in Galois Field
79.(marks-4)
10) Write Euclid's algorithm and show the steps of Euclid’s algorithm to find
gcd(401,700).
11) List and explain transposition techniques in cryptography (marks-3)
Chapter-2
1) List down various modes of operations of block cipher and explain any three of
them briefly.
2) Differentiate Following: i)Stream Cipher and block cipher
3) Explain a single round of DES algorithm.
4) Justify how DES(Data Encryption standard) algorithm observes Fiestel structure.
Discuss use of S-box in DES algorithm.
5) Draw a detailed block diagram of encryption process in DES. Add appropriate
description. (07)
6) Explain Confusion & Diffusion (marks-4)
7) Explain Key Expansion in AES algorithm.
8) Explain four different stages of AES(Advance Encryption standard) structure.
(marks-7)
Chapter-3
Chapter-4
1) In a public key system using RSA, the cipher text intercepted is C=12 which is sent
to the user whose public key is e=5, n=35. What is the plaintext M?
2) Explain Diffie Hellman scheme with diagram. For DiffieHellman algorithm, two
publicly known numbers are prime number 11 and the primitive root of it is 2. A
selects the random integer 9 and B selects 4. Compute the public key of A and B.
Also compute common secret key(MARKS-7)
1