CHS - Question Bank - Unit - 1&2
CHS - Question Bank - Unit - 1&2
UNIT-1
COMPUTER SECURITY BASICS
Computer Security Concepts, OSI Security Architecture, Security Attacks, Security Services, Security
Mechanisms, Model for Network Security, Classical Encryption techniques- Substitution and
Transposition methods, Block Cipher Principles
2-MARKS
S.N Questions CO KL
o
1 Specify the goals of Computer Security. CO1 K1
2 Give the three components of the C.I.A. triad? What are they used for? CO1 K1
[GATE, 16-22]
3 Find the need of Computer Security. CO1 K2
4 Discussabout confidentiality and authentication CO1 K1
5 Define the term cryptography. CO1 K1
6 Interpret integrity and non-repudiation CO1 K1
7 Differentiate Threat and attack. CO1 K2
8 What are the aspects required for Network security model? CO1 K1
9 Can you explain the concept security attack, security mechanism CO1 K1
and security services
10 Distinguishpassive attack from active attack with example. CO1 K2
11 Interpret masquerade. CO1 K1
12 Where Replay attack involves? CO1 K2
13 Mention the various types of cryptanalytic attack. CO1 K1
14 What kind of attack is characterized by overwhelming a CO1 K2
system with a flood of traffic to disrupt its normal
operation? (GATE, 2014)
15 Consider the following substitution cipher where each letter CO1 K2
is shifted by 3 positions in the alphabet (a Caesar Cipher):
Given Ciphertext: "KhoorZruog"Decrypt the ciphertext to
find the original message.What is the decrypted message?
(GATE, 2023)
16 Mention the different types of security services. CO1 K1
17 Can you explain the concept security mechanism. CO1 K1
18 Tell about cryptanalysis and cryptology. CO1 K1
19 Define the following terms CO1 K1
i)Plaintext ii)Cipher text iii)Encryption/Enciphering iv)
Decryption/ Deciphering:
20 Differentiate Cryptography and Steganography. CO1 K2
21 Classifythe two basic building blocks of encryption CO1 K2
techniques
22 Interpret Denial of service.( GATE, 2019) CO1 K1
23 Identify the two approaches to attacking a cipher? CO1 K2
24 Summarize about Brute-force attack. CO1 K1
25 Specify about Modification of messages CO1 K1
26 Classify the essential ingredients of symmetric cipher? CO1 K1
27 How many keys are required for two people to CO1 K2
communicate via cipher?
28 State Caesar cipher. CO1 K1
29 Define the Monoalphabeticcipher. CO1 K1
30 Interpretplayfair cipher CO1 K1
31 CompareMonoalphabetic and Polyalphabetic Cipher. CO1 K2
32 Identify the two problems with one-time pad? CO1 K2
33 Give outline about transposition cipher? CO1 K1
34 Classify the types of Cryptanalytic Attacks CO1 K2
35 List out the components of encryption algorithm CO1 K1
36 Compare Substitution and Transposition techniques CO1 K1
37 Differentiate symmetric and asymmetric encryption? CO1 K1
38 Mention few mono-alphabetic and poly-alphabetic ciphers CO1 K1
39 List out the problems of one time pad CO1 K2
40 Convert the Given Text “CRYPTOGRAPHY” into cipher text CO1 K2
using Rail fence Technique
41 Tell aboutsteganography. Mention few techniques in it. CO1 K2
42 Compare stream cipher with block cipher with example. CO1 K1
43 Why it is important to study feistel cipher? CO1 K1
44 Specify the parameters and design choice determines the CO1 K1
actual algorithm of Feistel cipher.
45 Give the five modes of operation in block cipher CO1 K1
46 Compare diffusion and confusion. CO1 K2
PART – B 15 Marks
CO
Q.
Questions KL Attainme
No.
nt
1. (i) Give explanation in detail about Computer Security CO1
K1
Concepts with example.(7 marks)
(ii) Consider an automated cash deposit machine in
which users provide a card or an account number
to deposit cash. Give examples of confidentiality,
integrity, and availability requirements associated K3 CO1
with the system, and, in each case, indicate the
degree of importance of the requirement. (8
marks)
2. Describe in detail about OSI Security Architecture K1 CO1
(15 marks)
3 (i) Summarize the functional requirements of K1 CO1
computer Security.(7 marks)
(ii) Sketch and explain the X.800 security architecture K1 CO1
for OSI(8 marks)
4. (i) Explain in detail about Security Attack(10 marks) K1 CO1
(ii) Define the type of security attack in each of the
following cases:
a. A student breaks into a professor’s office to
obtain a copy of the next day’s test.
b. A student gives a check for RS 100 to buy a K3 CO1
used book. Later she finds that the check was
cashed for RS 1000.
c. A student sends hundreds of e-mails per day to
another student using a phony return e-mail
address. (5 marks)
5 Discuss the types of security threads and attacks
that must be dealt with and give examples of the
types of threats and attacks that apply to different K2 CO1
categories of computer and network assets.(15
marks)
6 Sketchanddescribe briefly on Network Security K1 CO1
model with neat diagram. (15 marks)
7 Interpret in detail about Symmetric Encryption or CO1
K2
Symmetric Cipher model(15 marks)
8 Illustrate and discuss about the various CO1
K2
substitution techniques with example.(15 marks)
9 Encrypt the following using play fair
c i p h e r u s i n g t h e k e y w o r d MONARCHY.” CO1
K3
SWARAJ IS MY BIRTH RIGHT” Use X for
blank spaces(15 marks)
10 Encrypt the message “paymoremoney”
using hill cipher with the following key
matrix
and show the decryption to get original CO1
K3
plain text.(15 marks)
[ ]
17 17 5
21 18 21
2 2 19
11 E n c r y p t t h e m e s s a g e “MEETME” u s i n g H i l l
cipher with the following key matrix
and show the decryption to get original
plain text.(15 marks) K3 CO1
[ ]
17 17 5
21 18 21
2 2 19
12 Demonstrate encryption and decryption process in
hill cipher. Consider m = “sh” and key = hill”. (15 K3 CO1
marks)
13 (i) Given Cipher text
“YMJTYMJWXNIJTKXNQJSHJ”, knowing the
message is K3 CO1
encrypted by Caesar cipher and k=5. Try
to decrypt the message. (8 marks)
(ii) Using Vigenere cipher, encrypt the word
“explanation” using the key leg.(7 K3 CO1
marks)
14 ( i ) Use vigenere cipher to encrypt the message “we
are discovered save yourself” with the key K3 CO1
“deceptive”(7 marks)
(ii) Encrypt the plain text “Attack postponed to K3 CO1
tomorrow and do not use our secret paper until
further info” using Monoalphabetic cipher
technique.
Secret key: The quick brown fox jumps over lazy
dog.
Note: Ignore the second and later occurrence of
alphabets in the key.(8 marks)
15 This problem explores the use of a one-time pad
version of the Vigenère cipher. In this scheme, the
key is a stream of random numbers between 0 and
26. For example, if the key is 3 19 5 . . . , then the
first letter of plaintext is encrypted with a shift of 3
letters, the second with a shift of 19 letters, the CO1
K3
third with a shift of 5 letters, and so on.
a. Encrypt the plaintext sendmoremoney with
the key stream 3 11 5 7 17 21 0 11 14 8 7 13 9
b. Using the ciphertext produced in part (a), find a
key so that the ciphertext decrypts to the plaintext
cashnotneeded.(15 marks)
16 ( i ) a)Convert the Given Text “meet me after the
toga party” into cipher text using Rail fence
Technique CO1
K3
b)Convert the Given Text “attack postponed
until two am” into cipher text usingRow
Transposition Ciphers Technique
(ii) Write about transposition methods with suitable
examples K2 CO1
2-MARKS
S.N Questions CO KL
o
1 Infer about DES. What are the advantages and CO2 K1
disadvantages?
2 Classify the techniques involved for each round in DES? CO2 K1
3 Write down the purpose of S-Boxes in DES? CO2 K2
4 Interpret about Round Keys Generation in DES? CO2 K1
5 Can you define about avalanche effect CO2 K1
6 Define DES decryption CO2 K1
7 Brief the strength of DES. CO2 K2
8 Classify the Attacks on DES. CO2 K1
9 Express about AES. CO2 K1
10 List the operations used in AES. CO2 K1
11 Can you define the purpose of the state array CO2 K2
12 How is the S-box constructed in AES? CO2 K1
13 Describe subBytes. CO2 K1
14 Mention about ShiftRows Operation in AES CO2 K1
15 Express number of bytes in State are affected by ShiftRows CO2 K2
16 Enumerateabout MixColums in AES. CO2 K1
17 Interpret about AddRoundKey in AES. CO2 K1
18 Classify the AES transformation Functions. CO2 K1
19 Can you tell about double DES CO2 K1
20 What is a meet-in-the-middle attack? CO2 K1
21 List out the disadvantages of double DES CO2 K1
22 Brief the strength of triple DES. CO2 K1
23 State about Substitute byte transformation in AES? CO2 K1
24 Describe ShiftRows transformation in AES? CO2 K1
25 Tell aboutMixColumns transformation in AES? CO2 K1
26 Mention the role ofAddRoundKey transformation in AES? CO2 K1
27 What is mean by Multiple encryption ? CO2 K1
28 Compare DES and AES CO2 K2
29 In AES, how the encryption key is expanded to produce CO2 K2
keys for the 10 rounds?
30 State the drawbacks of 3-DES
PART – B 15 Marks
Q.
Questions CO KL
No.
1. Describe DES algorithm with neat diagram and explain the steps CO2 K2
2 Express DES encryption and DES decryption Process in detail CO2 K2
3 Explain about AES algorithm General Structure with
(i) AES Encryption process(10) CO2 K2
(ii) Key and Expanded key(5)
4 Illustrate about AES algorithm Detailed Structure with
(i) AES encryption and Decryption(8) CO2 K2
(ii) AES encryption Round(7)
5 For each of the following elements of DES, indicate the comparable
element in AES if available.
(i) XOR of sub key material with the input to the f- function (4) CO2 K3
(ii) F-function (4)
(iii) Permutation P(3)
(iv) Swapping of halves of the block(4)
6 Illustrate the structure of DES algorithm and explain its strength and CO2 K2
weakness
7 (i) How Meet in the middle attack is performed on double Data
encryption Standard? (7) CO2 K2
(ii) Explain the substitution bytes transformation and add round key
transformation of AES cipher. (6) CO2 K3
12 Write down the steps in the following algorithm and explain with
neat diagram CO2 K2
(i)Triple DES with Two keys
(ii)Triple DES with Three keys
Class In-Charge HoD/CSE