You are on page 1of 3

MEENAKSHI SUNDARAJAN ENGINEERING COLLEGE, CHENNAI-24.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


QUESTION BANK

Subject Code / Subject Name:CS6701 / CRYPTOGRAPHY AND NETWORK SECURITY


Year / Sem: IV / VII

UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC –MD5 - SHA - HMAC – CMAC - Digital signature and authentication protocols –
DSS – EI Gamal – Schnorr.
C401.3 Understand the working and usage of hash functions and digital signatures
PART A
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. What are the functions for message authentication? BTL-1 Remember C401.3 PO1
2. Specify the requirements for message authentication? BTL-1 Remember C401.3 PO1
3. What is a message authentication code? BTL-1 Remember C401.3 PO1
4. How is security of MAC function expressed? BTL-2 Understand C401.3 PO1
5. What types of attacks are addressed by message BTL-2 Understand C401.3 PO1
authentication?
6. What two levels of functionality comprise a message BTL-2 Understand C401.3 PO1
authentication or digital signature mechanism?
7. What is a hash in cryptography? BTL-2 Understand C401.3 PO1
8. Differentiate Hash function and MAC? BTL-2 Understand C401.3 PO2
9. What is a message digest? BTL-1 Remember C401.3 PO1
10. What are the arithmetic and logical functions used in BTL-2 Understand C401.3 PO1
SHA?
11. What is SHA-2? BTL-1 Remember C401.3 PO1
12. What is the difference between little endian and big BTL-2 Understand C401.3 PO1
endian format?
13. List the characteristics of a good hash function. BTL-1 Remember C401.3 PO1
14. What is the one way property of hash function? BTL-1 Remember C401.3 PO1
15. What is the role of compression function in a hash BTL-2 Understand C401.3 PO2
function?
16. Define the term sponge construction? BTL-1 Remember C401.3 PO1
17. Define weak collision property and strong collision BTL-1 Remember C401.3 PO1
property of a hash function.
18. What is a digital signature? BTL-1 Remember C401.3 PO1
19. What are the properties of a digital signature? BTL-1 Remember C401.3 PO1
20. Differentiate direct and arbitrated Digital signature. BTL-2 Understand C401.3 PO2
21. In what order the signature function and the BTL-4 Analyze C401.3 PO2
confidentiality function be applied to a message,
and why?
22. Mention the significance of signature function used in BTL-2 Understand C401.3 PO1
Digital Signature Standard (DSS) approach.
23. How digital signature differs from authentication BTL-4 Analyze C401.3 PO2
protocols?
24. What are the threats associated with direct digital BTL-2 Understand C401.3 PO1
signature scheme?
25. List the various algorithms used in generating a digital BTL-1 Remember C401.3 PO1
signature.

26. What is DSS? BTL-1 Remember C401.3 PO1

PART B
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. Explain the various approaches of message BTL-4 Analyze C401.3 PO1,
authentication code with suitable diagrams. PO2
Why is it preferred to symmetric encryption?
2. What are the ways by which a hash code can provide BTL-2 Understand C401.3 PO1
message authentication? Explain each of them with
suitable diagrams.
3. Discuss the Message Digest-5 algorithm with suitable BTL-4 Analyze C401.3 PO1,
diagrams. Compare its performance with SHA-1. PO2
4. Discuss Secure Hash Algorithm with suitable diagrams. BTL-4 Analyze C401.3 PO1,
Compare its characteristics and variants? PO2
5. Discuss HMAC algorithm in detail with necessary BTL-2 Understand C401.3 PO1,
diagrams. PO2
6. Explain CMAC algorithm with suitable diagrams? BTL-2 Understand C401.3 PO1
7. Explain Digital signatures in detail with suitable BTL-2 Understand C401.3 PO1
diagrams.
8. Explain RSA algorithm for generating digital signature. BTL-4 Analyze C401.3 PO1,
How is it different from RSA encryption? PO2
9. Illustrate Digital Signature standard Algorithm with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
10. Illustrate Schnorr Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
11. Illustrate Elgamal Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
PART C
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. With a neat diagram, explain the steps involved in SHA BTL-3 Apply C401.3 PO3
algorithm for encrypting a message with the maximum
length of less than 2128 bits and produces as output a
512 bit message digest.
2. Compare SHA 1, SHA 256 and SHA 512 based on BTL-4 Analyze C401.3 PO2
various parameters and emphasizing on their
compression functions.
3. Explain the process of deriving eighty 64 bit words BTL-2 Understand C401.3 PO3
from the 1024 bits for processing of a single block and
also discuss single round function in SHA 512
algorithm. Show the values of W16, W17, W18, W19.
4. Alice chooses q=101 and p=7879. Alice selects h=3 BTL-5 Evaluate C401.3 PO4
and calculates g. Alice chooses x=75 as the private key
and calculates y. Now, Alice can send a message to
Bob. Assume that H(M)=22 and Alice choose secret
number k=50. Verify the signature.
5. Explain the following based on Digital Signature BTL-6 Create C401.3 PO6
Algorithm:
a. DSA specifies that if the signature generation process
results in a value of s = 0, a new value of k should be
generated and the signature should be recalculated.
Why?
b. What happens if a k value used in creating a DSA
signature is compromised?
6. Alice chooses prime p=19, a=10 and private key BTL-5 Evaluate C401.3 PO3
XA=16. Calculate public key. If H(M)=14 and K=5.
Compute the signature using Elgamal Digital signature
scheme and verify the same.

7. Compare the performance of RIPEMD-160 algorithm BTL-4 Analyze C401.3 PO2


and SHA-1.