You are on page 1of 2

Cryptography and network security

Multiple choice question

1)Symmetric key cryptography is …………..

a.Always slower than b. usually slower than

C of the same speed as d. faster than

ii) The ………. Attack is related to authentication

a).Interception b. fabrication

c. modification d. interruption

iii) SSl layer is located between

a).transport layer,network layer b. application layer, transport layer

c. Datalink layer, physical layer d. network layer ,datalink layer

iv).conversion of cipher text into plain text is called as

a).encryption b). decryption

c). cryptography d). cryptanalyst

v).RSA …. …….be used for digital signature

a).must not b.) can not

c). can d) should not

vi). FireWall is a specialized form of a

a).Bridge b). switch

c). network d) router

vii). DES encrypts blocks of …………. Bits

a).32 b). 56

c). 64 d). 128


Short Answer type Question

2. In a RSA system, the public key of a given user is E=31 , N=3599.

What is private key of the user?

3. Name the four key steps in the creation of a digital certificate.

4. What is brute force attack ? Explain

5. Explain the working principle of RC5.

6. Why do you use digital signature ?

What are digital certificate ?

7. Explain the key generation process in DES.

8. What are the problems with symmetric key encryption ?

9. What do you mean by network security ?

Explain with a suitable model

10. What is the difference between passive and active security threats ?

You might also like