You are on page 1of 3

REGNO:

St. JOSEPH’S COLLEGE OF ENGINEERING


St. JOSEPH’S INSTITUTE OF TECHNOLOGY
CLASS TEST 1 – September 2020
Subject: Cryptography and Network Security Code: CS8792
Branch: CSE & IT Sem: VII
Duration: 1 Hour Max Marks: 50

Q. No Question CO Knowledge Level


State (Remember/
ment Apply/Analyze/
Understand
Evaluate/Create)
PART A
ANSWER ALL QUESTION (10 x 1 = 10 Marks)
1 Any action that compromises the security of information CO1 Remember
owned by organization is known as
a) Security attack
b) Security mechanism
c) Security service
d) All the above
2 A ___________ takes place when one entity pretends to be a CO1 Remember
different entity
a) Denial of service
b) Modification of message
c) Masquerade
d) Replay
3 ____________ is a scrambled message produced as output. CO1 Remember
a) Plaintext
b) Ciphertext
c) Secret information
d) Security related information
4 In cryptography the order of the letters in a message is CO1 Remember
rearranged by
a) Transposition cipher
b) Substitution cipher
c) Both
d) Quadratic cipher
5 Use Caesar cipher to decipher the following: HQFUBSWHG CO1 Remember
WHAW Apply
a) ABANDONED LOCK
b) ENCRYPTED TEXT
c) ABANDONED TEXT
d) ENCRYPTED LOCK
6 Use Vigenere cipher to decrypt the following : CO1 Remember
Message : she is listening Keyword : pascal Apply
a) hhwkswxslgntcg
b) hhwkswhhwksw
c) hhwkswxslgnthh
d) hhwkswcgxslgnt
7 Encipher “CHUCK NORRIS IS A TOUGH GUY” using a CO1 Remember
rail fence cipher. Apply
a) CUKORSSTUHUHCNRIIAOGGY
b) HCNRIIAOGGYCUKORSSTUHU
c) TUHUHCNRIIAOGGYCUKORSS
d) GGYCUKORSSTUHUHCNRIIAO
8 Encipher “NEW ENGLAND BEAT CAROLINA IN THE CO1 Remember
SUPER BOWL” using a simple 5 column transposition Apply
cipher.
a) PWNGBANHELELERAERWAAOISBENTLNUONDCIT
b) BANHELELERAERWAAOISBENTLNUONDCITPWNG
c) NGBANHELELERAERWAAOISBENTLNUONDCIWPT
d) NGBANHELELERAERWAAOISBENTLNUONDCITPW
9 Cryptanalysis is what the layperson calls CO1 Remember
a) Cipher
b) Breaking the code
c) Plaintext
d) Cipher text
10 Caesar cipher is an example of CO1 Remember
a) Polyalphabetic cipher Apply
b) Monoalphabetic cipher
c) Muticipher
d) None of the above
PART B
ANSWER ALL QUESTION (5 x 2 = 10 Marks)
11 Differentiate between active attack and passive attack CO1 Remember
12 What is the need for security at multiple levels? CO1 Remember
13 Differentiate between monoalphabetic cipher and CO1 Remember
polyalphabetic cipher
14 Differentiate between attack and threat CO1 Remember
15 What is product cryptosystem? CO1 Remember
PART C
ANSWER ALL QUESTIONS (2 X 15 =30 Marks)
16. a i) Explain the network security model and its important CO1 Remember
parameters with a neat block diagram (7)

ii) Encrypt the following using Playfair cipher. (8) CO1 Remember
Keyword : MONARCHY Apply
Message: SWARAJ IS MY BIRTH RIGHT. Evaluate
Use X for blank spaces. Discuss the rules to be followed.
OR
16 b i) What is Steganography? Describe the various techniques in CO1 Remember
Steganography? Discuss the advantages and
disadvantages.(7)

ii) Encrypt the word “semester result” with the keyword CO1 Remember
“examination” using Playfair method. Discuss the rules to be Apply
followed.(8) Evaluate
17 a i) Explain security services in detail. (7) CO1 Remember

ii) Perform encryption and decryption using Hill cipher for the CO1 Remember
following: Message: PEN Keyword: ACTIVATED (8) Apply
Evaluate
OR
17 b i) Explain legal, ethical and professional aspects of security in CO1 Remember
detail. (7)

ii) Perform encryption and decryption using Hill cipher for the CO1 Remember
following : Apply
Message : FRIDAY Evaluate

Key K =

You might also like