0% found this document useful (0 votes)
88 views2 pages

Ccs Important Questions

cryptography and cyber security important question

Uploaded by

lavanyapost123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views2 pages

Ccs Important Questions

cryptography and cyber security important question

Uploaded by

lavanyapost123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Part a

1. Define an attack ?
2. What are the key principles of security ?
3. What is an avalanche effect ?
4. What is DES?
5. What is key distribution centre ?
6. Difference between conventional encryption and public-key encryption ?
7. What is hash function in cryptography ?
8. What is MAC ? Mention the requirement of MAC
9. Define cloud computing ?
10. What is password sniffing?
Part-B
11(a) (i) Describe in detail security mechanism
(ii) What is transposition techniques OR
(b)(i) What are the elements of information security? Explain
(ii) Define passive attack? explain types of passive attack i
12 (a) (i)To find 11^13 mod 53.
(ii) What is block cipher ? explain advantage and disadvantage of block cipher
OR
(b) Design the functionality diagram of S-DES with number of bits with each flow
13 a) (i)Explain public key cryptography? Discuss its requirements
(ii) using the RSA algorithm encrypt the following
i) P=3,Q=11,E=7,M=12; ii) P=7,Q=11,E=17,M=25; iii) Find the corresponding ds for i) and ii) and
decrypt the ciphertext OR
(b) i) user A and B use the diffie-hellman key exchange technique with a common prime q=71
and a primitive root α =7 a) If user has private key Xa=5, what isA’s public key Ya? b) if user B
has private key Xb=12,what is B’s public key Yb?
c) what is the shared secret key ?
ii) performance encryption and decryption using RSA algorithm for p=7,q=11,e=7 and M=9
14 a) i) Discuss authentication requirements.
ii) Explain HASH function with neat diagram OR
b.)What is digital signature? Explain the key generation signing and signature verification
algorithm and create a digital signature?
15 a.)What is cybercrime? Explain the types of cybercrime.
OR
b.)What is web security? Discuss web security issues.
PART-C
16.)Explain about the Data encryption standard with a neat diagram?
OR
17.)Explain OSI security architecture model with neat diagram

PART – B
11 (a)(i) What are the elements of information security? Explain
(ii) Define passive attack? explain types of passive attack
OR
(b) Design the functionality diagram of S-DES with number of bits with each flow

12 a.i) User A and B use the diffie-hellman key exchange technique with a common prime q=71
and a primitive root α =7 a) If user has private key Xa=5, what isA’s public key Ya? b) if user B
has private key Xb=12,what is B’s public key Yb?c) what is the shared secret key ?
ii) performance encryption and decryption using RSA algorithm for p=7,q=11,e=7 and M=9
OR
(b)What is digital signature? Explain the key generation signing and signature verification
algorithm and create a digital signature?

13 a.)What is web security? Discuss web security issues.


OR
(b) (i) What are the elements of information security? Explain
(ii) Define passive attack? explain types of passive attack

14 (a)(i)To find 11^13 mod 53.


(ii) What is block cipher ? explain advantage and disadvantage of block cipher
OR
(b) (i)Explain public key cryptography? Discuss its requirements
(ii) using the RSA algorithm encrypt the following
i) P=3,Q=11,E=7,M=12; ii) P=7,Q=11,E=17,M=25; iii) Find the corresponding ds for i) and ii) and
decrypt the ciphertext

15(a) i) Discuss authentication requirements.


ii) Explain HASH function with neat diagram
OR
What is cybercrime? Explain the types of cybercrime.

PART-C
16 (a) If generator g =2 and n or P=11,using diffie-hellman algorithm solve the following
i) show that 2 is a primitive root of 11
ii)If A has a public key ‘9’ what is A’s private key ?
iii) if B has a public key ‘3’ what is B’s private key ?
iv) calculate the shares secret key
(b)Perform encryption and decryption using RSA algorithm for p=17,q=11,e=7 amd M=88.
OR
17.using hill cipher encrypt the message ‘ESSENTIAL’.the key for encryption is ‘ANOTHERBZ’

You might also like