Professional Documents
Culture Documents
QUESTION BANK
V SEMESTER
18CSE381T – CRYPTOGRAPHY
2018 Regulation
Prepared by
Dr M.AZHAGIRI ME.,MBA.,Ph.D
Assistant Professor
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
Ramapuram Campus, Bharathi Salai, Ramapuram, Chennai-600089
QUESTION BANK
UNIT I
Introduction to Cryptography and Network Security, OSI Security Architecture,
Introduction to Security attacks, Security mechanisms, Symmetric cipher model,
Substitution techniques: Caesar cipher, Play fair Cipher, Mono alphabetic cipher,
Poly alphabetic ciphers , Onetime pad, Hill Cipher -Encryption, Decryption,
Transposition techniques, Steganography
PART-A (Multiple Choice Questions)
Q. Questions Course Competen
No Outcome ce
BT Level
1 Which one is the strong attack mechanism?
A. Substitution cipher
B. Transposition cipher CO1 BT 1
C. Substitution as well as transposition
D. Steganography
A. Security process
CO1 BT 1
B. Security authentication
C. Security gaps
D. Security mechanism
A. Masquerade
B. Traffic analysis CO1 BT 1
C. Eavesdropping
D. Shoulder Surfing
A. Masquerade
CO1 BT 1
B. Traffic analysis
C. Replay attack
D. Denial of Service
A. Security Service
CO1 BT 2
B. Security Mechanism
C. Man in Middle Attack
D. Security attack
A. Active Attack
CO1 BT 1
B. Passive Attack
C. Both Active Attack and Passive attack
D. Neither Active Attack nor Passive attack
A. WTAAD
CO1
B. WTBBD
C. XUAAE
D. XUBBE
A. KENT CO1 BT 1
B. KCNT
C. KESN
D. KEST
A. YES
CO1 BT 1
B. YWS
C. YFS
D. YXS
A. Substitution
B. Transposition CO1 BT 2
C. Product cipher
D. Caesar cipher
17 On Encrypting “THEPEPSIISINTHEREFRIGERATOR”
using Vignere Cipher System using the keyword
“HUMOR” we get cipher text____________
A. ABQDNWEWUWJPHFVRRTRFZNSDOKVL
CO1 BT 1
B. ABQDVMWUWJPHFVVYYRFZNYDOKVL
C. TBQYRVMWUWJPHFVVYYRFZNYDOKVL
D. BAIUVMWUWJPHFOEIYRFZNYDOKVL
A. integration
B. differentiation CO1 BT 1
C. matrix algebra
D. differential equation
A. Cryptography CO1 BT 1
B. Tomography
C. Steganography
D. Chorography
A. Cryptography CO1 BT 1
B. Steganography
C. Tomography
D. Chorography
21 Which of the following is a type of transposition cipher?
A. Rail Fence cipher
B. Hill cipher
CO1 BT 1
C. Rotor cipher
D. One time pad
A. Combination
CO1 BT 1
B. Permutation
C. Integration
D. Differentiation
A. many-to-one relationship
CO1 BT 1
B. one-to-many relationship
C. many-to-many relationship
D. one-to-one relationship
A. block of packets
B. block of slots
C. block of signals
D. block of symbols
PART B (4 Marks)
1 What is cryptanalysis and cryptography? CO1 BT 1
2 What are the key principles of security? CO1 BT 1
3 Define threat and attack. CO1 BT 1
4 Specify the four categories of security threads. CO1 BT 1
5 Differentiate between active and passive attacks CO1 BT 2
6 What are active and passive attack that compromise
CO1 BT 1
information security
7 What are the two basic functions used in encryption
CO1 BT 1
algorithms?
8 What is the difference between a mono alphabetic and a poly
CO1 BT 2
alphabetic cipher?
9 Compare Substitution and Transposition techniques? Give
CO1 BT 2
an example
10 Convert the text “srm university” into cipher text using rail
CO1 BT 2
fence technique
11 Decipher the following cipher text using brute force attack: CO1 BT 2
CMTMROOEOORW using rail fence algorithm
12 How will you perform attack on Hill Cipher? CO1 BT 2
13 List out the problems and its disadvantage of one time pad CO1 BT 2
encryption algorithm?
14 What is meant by affine cipher and block cipher? CO1 BT 2
15 What is the difference between an unconditionally secure CO1 BT 2
cipher and a computationally secure cipher
16 Why it is not practical to use an arbitrary reversible CO1 BT 2
substitution cipher?
17 How many keys are required for two people to communicate CO1 BT 2
via a cipher?
18 What are the two approaches to attacking a cipher? CO1 BT 2
19 What are the design parameters of Feistel cipher network? CO1 BT 2
20 Define steganography. List out its techniques CO1 BT 1
E. 3
F. 5 CO 2 BT 2
G. 6
H. 10
9 Let us consider the following statements
(i) (Z10, +) is a cyclic group
(ii) (Z, +)is not a cyclic group
Select the correct option from below
CO 2 BT 2
A. and (ii) both are true
B. and (ii) both are false
C. Only (i) is true
D. Only (ii) is true
10 Find the GCD of 1111 and 51 using Euclid's Algorithm
A. 1
CO 2 BT 2
B. 2
C. 3
D. 4
11 What is 11 mod 7 and -11 mod 7?
A. 4 and 5
B. 4 and 4 CO 2 BT 2
C. 5 and 3
D. 4 and -4
15 Determine ϕ(21)
A. 1, 2, 4, 5, 8, 10, 11, 13, 16, 17, 19, 20
B. 1, 2, 3, 4, 5, 6, 8, 10, 11, 12, 13, 15, 16, 17,
18, 19, 20, 21
CO2 BT 3
C. 1, 2, 4, 5, 7, 8, 10, 11, 13, 14, 16, 17, 19, 20,
21
D. 1, 2, 4, 5, 8, 10, 11, 13, 16, 17, 19, 20, 21
16 Determine ϕ(15)
A. 1,2,3, 4,6,7,8,9,11,12,13,14,15
B. 1,2,4,5,7,8,10,11,13,14,15
CO2 BT 3
C. 1,2,4,7,8,11,13,14
D. 1,2,4,7,8,11,13,14, 15
2 Explain in detail about (i) Groups (ii) Rings (iii) Fields with CO 2 BT 2
an example
3 (a) State Euclid‟s algorithm and find the inverse of 550 mod CO 2 BT 3
1759.
(b) Explain Extended Euclid‟s algorithm with an example.
4 Explain Finite Fields with their application in cryptography. CO 2 BT 2
A. i) and iv)
B. i) ii) and iv)
C. iv)
D. d) i) ii) and iii)
25 What are the allowable values of word size in bit for RC5 CO 3 BT 1
algorithm?
A. 16, 32
B. 16, 32, 64
C. 8, 16, 32
D. d) 16, 32, 48
PART B (4 Marks)
11 If a bit error occurs in plain text block p1, how far does the CO 3 BT 2
error propagate in CBC mode of DES and 8-bit CFB mode of
DES?
12 What was the final set of criteria used by NIST to evaluate CO 3 BT 1
candidate AES Ciphers.
13 What is AES cipher? List out the parameters of AES. CO 3 BT 1
3 CO 4 BT 1
Knapsack problem can be solved by_________
A. Public key cryptosystem
B. Private key cryptosystem
C. Public & Private key cryptosystem
D. Secret Key Cryptosystem
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
7 A total of seven messages are required in the Public- CO 4 BT 1
Key distribution scenario. However, the initial five
messages need to be used only infrequently because
both A and B can save the other’s public key for future
– a technique known as ____
A. time stamping
B. polling
C. caching
D. squeezing
8 Which of these systems use timestamps as an CO 4 BT 1
expiration date?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
9 Which systems use a timestamp? CO 4 BT 2
(i) Public-Key Certificates
(ii) Public announcements
(iii) Publicly available directories
(iv) Public-Key authority
A. C=80
B. C=92
C. C=56
D. C=23
14 Which of the following encryption methods deals with CO 4 BT 3
two distinct large prime numbers and the inability to
factor those prime numbers?
A. RSA
B. Symmetric
C. WPA
D. d. SHA-1
15 In the RSA public key cryptosystem, the private and CO 4 BT 3
public keys are (e, n) and (d, n) respectively, where n = p
x q and p and q are large primes. Besides, n is public
and p and q are private. Let M be an integer such that 0
< M < n and f(n) = (p-1)(q-1).
Now consider the following equations-
I. M’ = Me mod n and M = (M’)d mod n
II. ed ≡ 1 mod n
III. ed = 1 mod f(n)
IV. M’ = Me mod f(n) and M = (M’)d mod f(n)
Which of the above equations correctly represent RSA
cryptosystem?
A. I and II
B. I and III
C. II and IV
D. III and IV
16 Suppose You are using RSA Algorithm based CO 4 BT 3
cryptosystem to securely share the number of marbles
that you have currently with you currently with your
friends. The Private key that you are using is (3, 15)
Your Friends know the corresponding public key
(11,15), one of your friend wants to share the exact
amount of marble content only to you, what are the
maximal possible marbles your friend can have so that
he/she can secretly share that to you
A. 10
B. 12
C. 14
D. 16
A. 2^140
B. 2^150
C. 2^15
D. 2^10
A. 2
B. 3
C. 4
D. 5
6 Which attack requires the least effort/computations? CO 5 BT 1
A. Pre-image
B. Second Pre-image
C. Collision
D. All required the same effort
7 The hash function ___________ CO 5 BT 1
A. Has manageable collision
B. Has high unmanageable level of collision
C. Collision Creator
D. Is collision free
A. Message Digest
B. Message Summary
C. Encrypted Message
D. Decrypted Message
A. Approval Signatures
B. Non-Certified Signatures
C. Visible Digital Signature
D. Invisible Digital Signature
22 In Digital Signature algorithm, Suppose users public CO 5 BT 2
key is PK= {p=7, q=3, g=4 g^xmod p=2} users private key
is SK=x=5 and the Secret Key number is k=2, Consider
a Messgage M with message digest h=HAsh(M)=3 , Then
the Users Signature for the message M is
(r,s)=______________
A. (3,3)
B. (3,2)
C. (2,3)
D. (2,2)
1 Draw and explain the MAC using neat diagrams and list its CO 5 BT 2
applications
2 Explain in detail about Message Authentication Code and its CO 5 BT 2
requirements.
3 (i).Apply the MAC on the cryptographic checksum method to CO 5 BT 3
authenticate builds confidentiality of the message where the
authentication is tied to message. M=8376, K1=4892,
K2=53624071?
(ii).What are the properties a hash function must satisfy?
4 Describe the MDS message digest algorithm with necessary CO 5 BT 2
block diagram.
5 Explain about MD5 in detail and describe MD5 processing of CO 5 BT 2
a single 512 bit block with neat diagram
6 Discuss clearly Secure Hash Algorithm to generate message CO 5 BT 2
digest in detail.
7 Write a detailed note on Digital signatures standards. CO 5 BT 2
Note:
1. BT Level – Blooms Taxonomy Level
2. CO – Course Outcomes
BT1 – Remember
BT2 – Understand
BT3 – Apply
BT4 – Analyze
BT5 – Evaluate
BT6 – Create