CRYPTOGRAPHY AND NETWORK SECURITY
MCQ:
1. Which of the following is an example of a symmetric encryption algorithm?
2. The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the ____, availability, and confidentiality of
information system resources
3. What is the minimum size of the key in blowfish algorithm
4. The kind of hash functions needed for security applications is referred to as a __ hash
function.
5. Which of these is a connection oriented service?
(a) ATM
(b) X.25
(c) Frame Relay
(d) All of these
6. The combination of the set and the operations applied to elements of the set is called an
______
7. What is the primary purpose of a Digital Signature in cryptography?
8. In a mod n = r, “r” is called _________
9. The "birthday attack" is related to which type of cryptographic attack?
10. In the case of the digital signature, the hash value of message is encrypted with a
user’s key________
11. Which of the following is not a property of Hash Function?
(a) Pre-Image Resistance
(b) Compression
(c) Fixed Length Output
(d) None of the above
12. Among which is additional concepts for CIA triad
(a) Authenticity
(b)Accountability
(c) Both A & B
(d) None of these
13.________ is software that is installed using an internet connection orthey come by-default
with operating
14. __________is an encryption method used to offer secure communication by e-mail
15. How many layers are there in the OSI reference model?
16. AES uses a ____________ bit block size and a key size of__________ bits.
17. Caesar Cipher is an example of________
18. In AES the 4×4 bytes matrix key is transformed into a keys of size__________
19. In NIST definition on Computer security, the keywords are______
20. The Euclidean algorithm gives an efficient and systematic way to calculation of
________
21. MAC refers to _________________
22. Kerberos is an/a _____________ service
23. A full service Kerberos environment consists of_______
24. ________ is a software to collect information from a computer and transmit it to another
computer
5 Marks Questions:
1. Specify and explain the four categories of security threats.
2. (a) Explain a symmetric-key cipher.
(b) Are all stream ciphers monoalphabetic?
3. Explain with an example how public key cryptography may be used for identification?
4. In an AES crypto system the round key for round 6 is
EA BC 73 23 45 67 32 87 E2 3D 9B 02 3 4E A2 F0. Find the first 4bytes of round key
for round 7. The values for Rc[j] in Hexadecimal
5. Compare Substitution and Transposition techniques.
6. a) Explain a symmetric-key cipher.
b) Are all stream ciphers monoalphabetic?
7. What do you mean by Hill Cipher? State its merits and demerits.
8. Explain Avalanche effect.
9. Compare between MAC and Message Digest
10. Describe the fields of SSL record protocol header.
15 Marks Questions:
1. a) What is the pattern in the cipher text of a one-time pad cipher in each of the following
cases?
(a) The plaintext is made of n 0’s
(b) The plaintext is made of n 1’s
(c) The plaintext is made of alternating 0’s and 1’s
(d) The plaintext is a random string of bits.
b) Describe Synchronous Stream Ciphers
c) What is Linear Cryptanalysis?
2.a) Explain Data Encryption Standard (DES) in detail.
b) How AES is used for encryption/decryption? Discuss with example.
c) List the evaluation criteria defined by NIST for AES.
3. Write short note on the following:
(a) Kerberos
(b) SSL Attack
( c ) Pretty Good Privacy
(d) Firewall design principles
( e) IPv6 authentication header
4. Write short notes on the following
(a) The Chinese Remainder Theorem
(b) Intrusion Detection
(c) Encapsulating Security Payload
(d) Euler’s Theorem
(e) IP Security Protocol
5. Answer all parts:
(a) How man-in-the-middle attack can be performed in Diffie–Hellman algorithm?
(b)Explain the authentication procedures defined by X.509 certificate. Illustrate the concept
of ‘certificate chain’ for verification of digital signature on X.509 certificate.
(c) What are the main features of Kerberos Version 5?
6. (a) Explain with example the S/MIME Cryptographic Algorithms
(b) Explain SHA algorithm.
(c) Compare between SHA-1 with MD5
7. (a) What is traffic padding? What is its purpose?
(b) What is message authentication?
(c) Define the classes of message authentication function.
(d) What are the requirements for message authentication?
(e) Differentiate MAC and Hash function.
8. (a) Identify the possible threats for RSA algorithm and list their countermeasures.
(b) Perform decryption and encryption applying RSA algorithm with p = 3, q = 11, e = 7
and N = 5.
9. (a) What is the difference between stream cipher and block cipher? (2 marks)
(b) What types of attacks may occur on block ciphers? (4 marks)
(c) Describe a single round of DES with block diagram. (7 marks)
(d) “Authentication can be achieved using DES”—Comment. (2 marks)
10. (a) What is electronic money? (2 marks)
(b) What is SET? Explain with a suitable model. (7 marks)
(c) How are pre-master-secret and master-secret prepared in SSL handshake
protocol? (3 marks)
(d) Describe the fields of SSL record protocol header. (3 marks)