Ccs Important Questions
Ccs Important Questions
1. Define an attack ?
2. What are the key principles of security ?
3. What is an avalanche effect ?
4. What is DES?
5. What is key distribution centre ?
6. Difference between conventional encryption and public-key encryption ?
7. What is hash function in cryptography ?
8. What is MAC ? Mention the requirement of MAC
9. Define cloud computing ?
10. What is password sniffing?
Part-B
11(a) (i) Describe in detail security mechanism
(ii) What is transposition techniques OR
(b)(i) What are the elements of information security? Explain
(ii) Define passive attack? explain types of passive attack i
12 (a) (i)To find 11^13 mod 53.
(ii) What is block cipher ? explain advantage and disadvantage of block cipher
OR
(b) Design the functionality diagram of S-DES with number of bits with each flow
13 a) (i)Explain public key cryptography? Discuss its requirements
(ii) using the RSA algorithm encrypt the following
i) P=3,Q=11,E=7,M=12; ii) P=7,Q=11,E=17,M=25; iii) Find the corresponding ds for i) and ii) and
decrypt the ciphertext OR
(b) i) user A and B use the diffie-hellman key exchange technique with a common prime q=71
and a primitive root α =7 a) If user has private key Xa=5, what isA’s public key Ya? b) if user B
has private key Xb=12,what is B’s public key Yb?
c) what is the shared secret key ?
ii) performance encryption and decryption using RSA algorithm for p=7,q=11,e=7 and M=9
14 a) i) Discuss authentication requirements.
ii) Explain HASH function with neat diagram OR
b.)What is digital signature? Explain the key generation signing and signature verification
algorithm and create a digital signature?
15 a.)What is cybercrime? Explain the types of cybercrime.
OR
b.)What is web security? Discuss web security issues.
PART-C
16.)Explain about the Data encryption standard with a neat diagram?
OR
17.)Explain OSI security architecture model with neat diagram
PART – B
11 (a)(i) What are the elements of information security? Explain
(ii) Define passive attack? explain types of passive attack
OR
(b) Design the functionality diagram of S-DES with number of bits with each flow
12 a.i) User A and B use the diffie-hellman key exchange technique with a common prime q=71
and a primitive root α =7 a) If user has private key Xa=5, what isA’s public key Ya? b) if user B
has private key Xb=12,what is B’s public key Yb?c) what is the shared secret key ?
ii) performance encryption and decryption using RSA algorithm for p=7,q=11,e=7 and M=9
OR
(b)What is digital signature? Explain the key generation signing and signature verification
algorithm and create a digital signature?
PART-C
16 (a) If generator g =2 and n or P=11,using diffie-hellman algorithm solve the following
i) show that 2 is a primitive root of 11
ii)If A has a public key ‘9’ what is A’s private key ?
iii) if B has a public key ‘3’ what is B’s private key ?
iv) calculate the shares secret key
(b)Perform encryption and decryption using RSA algorithm for p=17,q=11,e=7 amd M=88.
OR
17.using hill cipher encrypt the message ‘ESSENTIAL’.the key for encryption is ‘ANOTHERBZ’