Professional Documents
Culture Documents
1. We are provided the plain text “SUN”. You need to convert the given plain text into
ciphertext under the Ceasar cipher encryption technique. Which of the following
options is the correct ciphertext for the given text with k=3 ?
Option A: VWQ
Option B: VQX
Option C: UVP
Option D: WVQ
I. A and B can physically generate and distribute the key amongst each other.
II. Any third party C can physically generate and distribute the key to both A and B
III. A and B can get connected to a key distribution center and get the key.
Option A: Only I
3. For the knapsack :{1,6,8,15,24}, find the plaintext code if the ciphertext is 38
Option A: 10010
Option B: 01101
Option C: 01001
Option D: 01110
4. The method in which C tricks A to digitally sign the messages that A does not intend
to do and without the knowledge about A’s public key.
5. You're the security administrator for a bank. The users are complaining about the
network being slow. However, it is not a particularly busy time of the day. You
capture network packets and discover that hundreds of ICMP packets have been sent
to the host. What type of attack is likely being executed against your network?
Option A: Spoofing
Option B: Man-in-the-middle
Option C: Worm
7.
The above output achieved after applying hash function on arbitrary input will be
called
8. What will be the ciphered text if the plain text “SAN” is encrypted using hill cipher
with keyword as “GYBNQKURP”?
Option A: RAJ
Option B: JAR
Option C: ARJ
Option D: AJR
Option B: IP header
Option C: IP payload
Option D: IP trailer
Q2
ii. What are the properties of Hash function ?What is the role of a hash function in
security?
iii. Solve the given using Diffie Hellman Key Exchange algorithm
P=23, G=9, a=4 , b=3
i. What are the different protocols in SSL? How do client and server establish an SSL
connection?
ii. What is a Digital Certificate ? How does it help to validate the authenticity of a
user? Explain the X.509 certificate format.
Q3
ii. Explain Briefly with examples, how the following attack occur
i) Denial of Service ii) ICMP flood iii)SYN Flood
Q4
ii. Encrypt “academic committee will meet today” using Playfair Cipher with keyword
“ROYAL ENFIELD”