Cb3491 Crptography and Cyber Security
Cb3491 Crptography and Cyber Security
Cb3491 Crptography and Cyber Security
CB3491
CRYPTOGRAPHY AND CYBER SECURITY
Question Bank
III YEAR A & B / BATCH : 2021 -25
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
Vision of Institution
To build Jeppiaar Engineering College as an Institution of Academic Excellence in Technical education and
Management education and to become a World Class University.
Mission of Institution
To equip students with values, ethics and life skills needed to enrich their lives and
M3
enable them to meaningfully contribute to the progress of society
M4 To prepare students for higher studies and lifelong learning, enrich them with the
practical and entrepreneurial skills necessary to excel as future professionals and
contribute to Nation’s economy
M3 To produce engineers with good professional skills, ethical values and life skills for the
betterment of the society.
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services
and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution
techniques, Transposition techniques, Steganography – Foundations of modern cryptography:
Perfect security – Information Theory – Product Cryptosystem – Cryptanalysis.
Number theory – Algebraic Structures – Modular Arithmetic – Euclid‘s algorithm – Congruence and
matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS: SDES – Block Ciphers –
DES, Strength of DES – Differential and
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation
criteria for AES – Pseudorandom Number Generators – RC4 – Key distribution.
UNIT III ASYMMETRIC CRYPTOGRAPHY CB3491 Cryptography and Cyber Security Important
Questions
UNIT V CYBER CRIMES AND CYBER SECURITY CB3491 Cryptography and Cyber
Security Question Paper
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods –
Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud
Security – Web Security – Wireless Security
1. William Stallings, “Cryptography and Network Security – Principles and Practice”, Seventh
Edition, Pearson Education, 2017.
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer
Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.
An ability to understand the core concepts of computer science and engineering and to
PSO1 enrich problem solving skills to analyze, design and implement software and hardware
based systems of varying complexity.
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
PSO2 To interpret real-time problems with analytical skills and to arrive at cost effective and
optimal solution using advanced tools and techniques.
19 Define group
A group G, denoted by (G .) is the set of elements with a binary operation denoted by .
that associates to each ordered pair (a,b) of elements in G an element (a.b) in G, such
that the following axioms are obeyed
Closure: If a and b belong to G then a.b is also in G.
Associative: (a.b).c = a.(b.c) for all a,b,c in G
Identity element: There is an element e in G such that a.e=e.a=a for a in all G
Inverse element: For each a in G, there is an element a1 in G such that
a.a1=a1.a=a=e
20 Define Finite and Infinite group
If a group has a finite number of elements, it is referred as a finite group. Otherwise, the
group is an infinite group
21 Define Abelian group
A group is said to be abelian if it satisfies the fell-condition
Closure: If a and b belong to G then a.b is also in G.
Associative: (a.b).c = a.(b.c) for all a,b,c in G
Identity element: There is an element e in G such that a.e=e.a=a for a in all G
Inverse element: For each a in G, there is an element a1 in G such
that a.a1=a1.a=a=e
Commutative: a.b = b.a for all a,b in G
22 Define cyclic group
A group G is cyclic if every element of G is a power ak(k is an integer) of a fixed element
aG. The element a is said to generate the group G as to be a generation of G. A cyclic
group is always abelian and may be finite or infinite.
23 List the 4 different stages of AES.
Substitute bytes
Shift rows
Mix column
Add round key
24 Why modular arithmetic has been used in cryptography?
One of the major reasons is that modular arithmetic allows us to easily create groups,
rings and fields which are fundamental building blocks of most modern public key
crypto systems. For example, Diffie-Hellman uses the multiplicative group of integers
modulo a prime p.
25 List the uses of RC4 (or) List the applications of RC4.
RC4 is known for being simple and quick
RC4 is used in the SSL/TLS standards that have been defined for
communication between web browsers and servers
It is used in WEP &WPA protocols that are part of IEEE 802.11 WLAN standards
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
26 Why random numbers are use in network security?
Random numbers used to generate keys
Symmetric keys
RSA: Prime numbers
Diffie-Hellman secret
values Random numbers used for
nonce
Sometimes a sequence is okay
But sometimes nonce must be
random Random numbers also used in
simulations, statistics, etc. where numbers only need to be statistically random
27 What is the disadvantage of ECB mode of operation?
The disadvantage of this method is a lack of diffusion. Because ECB encrypts identical
plaintext blocks into identical ciphertext blocks, it does not wide patterns well.
28 What is the difference between a block cipher and a stream cipher? (Dec 2021)
Block cipher Stream cipher
A block cipher processes the input one A stream cipher processes the input
block of elements at a time, producing an elements continuously, producing output
output block for each input block. one element at a time, as it goes along
29 What is the difference between diffusion and confusion? (Dec 2021)
Diffusion Confusion
Diffusion is used to create cryptic plain Confusion is a cryptographic technique
texts. which is used to create faint cipher texts.
It is possible through transportation This technique is possible through
algorithm. substitution algorithm.
In diffusion, if one image within the plain In confusion, if one bit within the secret‟s
text is modified, many or all image within modified, most or all bits within the cipher
the cipher text also will be modified text also will be modified.
The relation between the cipher text and The relation between the cipher text and
the plain text is masked by diffusion. the key is masked by confusion.
Only block cipher uses diffusion. Both stream cipher and block cipher uses
confusion.
UNIT-II / PART-B
1 Explain AES algorithm with all its round functions in detail
2 Discuss the properties that are to be satisfied by groups, rings and fields
3 (ii) Demonstrate that the set of polynomials whose coefficients forms a field is a ring.
(5)
For each of the following elements of DES, indicate the comparable element in AES if
available
XOR of subkey material with the input to the function (4)
f function (4) (Dec 2020)
4 Describe DES algorithm with neat diagram and explain the steps. (Dec 2021)
5 Solve GCD (98,56) using extended Euclidean algorithm. Also, write the algorithm
6 What do you mean by AES? Diagrammatically illustrate the structure of AES and
describe the steps in AES encryption process with example (Dec 2020)
7 Describe in detail the key generation in AES algorithm and its expansion format
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
8 Describe Triple DES and its applications
9 Explain about the single round of DES algorithm
10 Describe key discarding process of DES
11 Explain the key generation, encryption and decryption of SDES algorithm in detail (Dec 11)
12 Write notes on birthday attack
13 Describe the working principle of simple DES with an example
14 Explain in detail about the entities in the symmetric cipher model with their
requirements for secure usage of the model
15 Demonstrate that the set of polynomials where coefficients form a field is a ring
16 Write detailed note on modular arithmetic
17 Explain the following in detail
Linear cryptanalysis
Differential cryptanalysis
Key distribution
18 Explain about RC4 algorithm with neat diagram? (Dec 2021)
19 Describe LFSR sequences and finite field with their application in cryptography
UNIT III – PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder
Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA
cryptosystem – Key distribution – Key management – Diffie Hellman key exchange –Elliptic
curve arithmetic-Elliptic curve cryptography.
UNIT-III/ PART-A
1 What is public key cryptography?
Public key cryptography (or asymmetric cryptography) is an encryption scheme that
uses two mathematically related, but not identical keys – a public key and a private key.
Each key performs a unique function. The public key is used to encrypt and the private
key is used to decrypt.
2 What is the difference between symmetric key cryptography and public key
cryptography?
Symmetric Key Cryptography Public Key Cryptography
Involves only one key (a secret key) to encrypt Uses a pair of keys – a public key and a
and decrypt the information private key
Speed of encryption (decryption is very fast) Slow
21mod 5 2 mod 5 2
22 mod 5 4 mod 5 4
1)
23 mod 5 8 mod 5 3
24 mod 5 16 mod 5 1
41 mod 5 4 mod 5 4
42 mod 5 16 mod 5 1
2)
43 mod 5 64 mod 5 4
44 mod 5 256 mod 5 0
So, 4 is not a primitive root of mod 5
7 Name any 2 methods for testing prime numbers.
a(n) 1(mod n)
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
10 Determine (37) and (35)
To determine (37) : Because 37 is prime, all the positive integers from 1 through 36 are
relatively prime to 37. So, (37) 36 .
To determine (35) :List all the positive integers less than 35 that are relatively prime to
it. (i.e) 1,2,3,4,6,8,9,11,12,13,16,17,18,19,22,23,24,26,27,29,31,32,33,34. There are 24
numbers on the list. So, (35) 24
11 State alternative form of Fermat‟s theorem with example.
The alternative form of Fermat‟s theorem: If p is prime and a is a positive integer than
ap a(mod p)
12 List the 6 ingredients of public key encryption.
Plaintext
Encryption algorithm
Public key
Private key
Cipher text
Decryption algorithm
13 Perform encryption for the plaintext M=88 using the RSA algorithm.
P=17, q=11 and public component e=7
i. p=17, q=11
ii. Calculate n=p*q = 17*11 =187
iii. Calculate (n) = (p-1)(q-1) = 16*10=160
iv. Select e=7
v. Determine d such that de 1(mod 60). The correct value of d is 23
Public key (7,187) and private key (23,187)
Encryption: 887 mod 187 = 11
14 Perform encryption and decryption using the RSA algorithm for the following.
P=7, q=11, e=17 and M=8
i. p=7, q=11
ii. Calculate n=p*q = 7*11 =77
iii. Calculate (n) = (p-1)(q-1) = 6*10=60
iv. Select e=17
v. Determine d such that de 1(mod 60). The correct value of d is 53
Public key (17,77) and private key (53,77)
Encryption: 817 mod 77 = 56
Decryption: 5653 mod 77 = 8
15 List the 5 possible approaches to attacking the RSA algorithm
Brute force
Mathematical attacks
Timing attacks
Hardware fault-based attack
Chosen ciphertext attacks
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
16 Define discrete logarithm
For any integers b and a primitive r not a of prime number p, we can find a unique
exponent I such that
b ai (mod p) where 0 ≤ I ≤ (p-1)
The exponent I is referred to as the discrete logarithm of b for the base a, mod p.
17 What is the principal attraction of ECC, compared to RSA? (Dec 2021)
The principal attraction of ECC, compared to RSA, is that it appears to offer equal
security for a far smaller key size, thereby reducing processing overhead. But the
confidence level of ECC is not yet as high as than in RSA. (i.e. ECC is fundamentally
more difficult to explain than either RSA or Diffie-Hellman
18 What is an ellipse curve?
Elliptic curve is a plane algebraic curve defined by an equation of the form y2=x3+ax+b
which is non-singular. Formally, an elliptic curve is a smooth, projective, algebraic curve
of genius arc, on which there is a specified point O.
19 Give the significance of key control
Hierarchies of Key Distributor Center (KDC) requires for large networks. A single KDC
may be responsible for a small number of users since it shares the master keys of all the
entities attached to it. If two entities in different domains want to communicate, local
KDCs communicate through a global KDC.
20 Why is asymmetric cryptography bad for huge data? Specify the reasons (May 18)
Asymmetric cryptography takes more time
Key management is difficult
Slower encryption speed due to long keys
21 Give the applications of the public key crypto system
To provide confidentiality (a message that a sender encrypts using the recipients
public key can be decrypted only by the recipient‟s private key
Digital signature (used for sender authentication)
Further applications built on this include: digital cash, password authenticated
key agreement, time-stamping services, non-repudiation protocol, etc.
22 What is the use of Fermat‟s theorem
Fermat‟s theorem is a fundamental theorem in elementary number theory, which helps
compute powers of integers modulo prime numbers.
It is a special case of Euler‟s theorem and is important in applications of elementary
number theory, including primality testing and public key cryptography.
23 Calculate 21102020 (mod 1009) using Fermat‟s theorem.
Are 2110 and 1009 co-prime?
If so, by the theorem 21101008 1 (mod 1009)
By multiplication rule, 21102016 1 (mod 1009)
Same as finding 21104 (mod 1009)
Ans – 21102020 296 (mod 1009)
CB3491 - Cryptography and Cyber Security Department of CSE & CCE
10 Define Spyware.
Spyware is a type of malware that is installed on computers which collects information
about users without their knowledge. It is clearly understood from the term Spyware that
it secretly monitors the user. The features and functions of such Spywares are beyond
simple monitoring.
11 Define SQL injection.
SQL injection, also known as SQLI, is a common attack vector that uses malicious
SQL code for backend database manipulation to access information that was not
intended to be displayed. This information may include any number of items,
including sensitive company data, user lists or private customer details.
CB3491 - Cryptography and Cyber Security Department of CSE & CCE