You are on page 1of 2

Nagpur Institute of Technology, Nagpur

Department of Computer Sci. & Engineering


Post graduation Course ME/M-Tech
Session:2013-14
QUESTION BANK FOR SESSIONAL EXAM
Subject: CNS(M-Tech 2-Sem), NSC (ME 2-Sem) Subject Teacher: Prof. Jagdish Pimple

1. How many possible keys does a playfair cipher have? Express the answer as an approximate power of
2.(**)
2. What are two problems with one time pad ? explain.(**)
3. Which parameter and design choices determine the actual algorithm of a feistal cipher? Explain.(**)
4. Show that DES decryption is in fact the inverse of DES encryption.(**)
5.List and briefly define types of cryptanalytic attack based on what is known to the attacker.(**)
6. Explain product cipher with suitable example.
7. Explain structure and purpose of S boxes in DES algorithm. (**)
8. Show that in DES the first 24 bit of each sub key come from the same subset of 28 bits of initial key and
that the second 24 bit of each subkey come from a disjoined subset of 28 bits of the initial key.
9.Differentiate between unconditionally secure cipher and computationally secure cipher.
10. Define steganography.(**)
11. How does playfair cipher works. (**)
12. Describe the advantages and disadvantages of symmetric and asymmetric key cryptography.(**)
13. What is the difference between monoalphabetic and polyalphabetic cipher ? explain
14. What are the two general approaches for attacking the cipher? Explain
15. Briefly explain the caesar cipher.
16. Differentiate between diffusion and confusion.
17. What substitution cipher? Explain types of substitution method along with example.
18. What transposition method? Explain different transposition method along with example.
19. Differentiate between stream cipher and block cipher method.
20. Explain OSI security architecture.
21. Explain security services in detail.
22. Explain feistal cipher structure and its encryption decryption process.
23. Explain process of encryption and decryption of Simplified-DES algorithm.
24. Explain stepwise encryption decryption process of DES algorithm.
25. Explain differential and Linear cryptanalysis.

You might also like