CB3491 CCS QUESTION BANKvcg
CB3491 CCS QUESTION BANKvcg
CB3491 CCS QUESTION BANKvcg
COLLEGE OF ENGINEERING
COIMBATORE - 641105
CB3491
CRYPTOGRAPHY AND CYBER
SECURITY
Question Bank
SYLLABUS
UNIT I INTRODUCTION TO SECURITY
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services
and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution
techniques, Transposition techniques, Steganography – Foundations of modern cryptography:
Perfect security – Information Theory – Product Cryptosystem – Cryptanalysis.
Number theory – Algebraic Structures – Modular Arithmetic – Euclid‘s algorithm – Congruence and
matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS: SDES – Block Ciphers – DES,
Strength of DES – Differential and
linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation
criteria for AES – Pseudorandom Number Generators – RC4 – Key distribution.
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods –
Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud
Security – Web Security – Wireless Security
1. William Stallings, “Cryptography and Network Security – Principles and Practice”, Seventh
Edition, Pearson Education, 2017.
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer
Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services
and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution
techniques, Transposition techniques, Steganography – Foundations of modern cryptography:
Perfect security – Information Theory – Product Cryptosystem – Cryptanalysis.
3 Define integrity.
Integrity ensures that only authorized parties are able to modify computer system assets and transmitted
information. Modification includes writing, changing, deleting, creating
and delaying or replaying of transmitted messages.
4 Define Authentication, Nonrepudiation, Availability and Access control. Authentication: Ensures that
the origin of a message is correctly identified, with anassurance that the identity is not false.
Nonrepudiation: Requires that neither the sender nor the receiver of a message be ableto deny the
transmission.
Availability: Requires that computer system assets be available to authorized partieswhen needed.
Access control: Requires that access to information resource may be controlled by or for
the target system.
It is difficult to prevent active attacks They are very difficult to detect (because they
absolutely. do not move any alternation to data). But it is
feasible to
prevent the success of these attacks.
9 List the components involved in network security (i.e. Model for network security)
Message
Two principals (Source and Destination)
Trusted third party
Opponent
28 Encrypt the plaintext tobeornottobe using the vigenere cipher for the key value Now.
(Dec 2020).
The encryption of the original text is done using the vigenere table. The table consists of the
alphabets written out 26 times in different rows, each alphabet shifted cyclically to the left compared
to the previous alphabet, corresponding to the 26 possible Caesar Ciphers. At different points in the
encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at
each point depends on a repeating keyword.
plaintext tobeornottobe
key value Now Transformed
text hdysdobdqhdys
29 How substitution cipher is different from transposition cipher. Give example for each
method (Dec 2021)
Substitution cipher Transposition cipher
A substitution technique is one in which Transposition cipher does not substitute
the letters of plain text are replaced byother letters one symbol for another instead it changesthe
or number or symbols. location of the symbols
Monoalphabetic and Polyalphabetic Keyless and Keyed transportation cipher.
substitution cipher.
Each letter retains its position changes its Each letter retains its identity but changes
identity its position
Example: Ceaser Cipher, Hill cipher, Example: Rail fence Cipher,
Vigenere cipher
30 Give an example each for substitution and transposition ciphers
Substitution Cipher: (Replace the plaintext characters with other characters, numbersand equal)
✓ Caesar cipher
✓ Hill cipher
✓ Vigenere cipher
Transposition cipher: (Rearranges the position of the characters of the plaintext)
✓ Rail fence cipher
UNIT-I / PART-B
1 (i) Explain OSI security architecture model with neat diagram (Dec 2020, Dec 2021)
(ii) Describe the various security mechanism (Dec 2020)
2 Encrypt the following using play fair cipher using the keyword MONARCHY.
“SWARAJ IS MY BIRTH RIGHT”. Use X for blank spaces.
3 Describe (i) Playfair Cipher (ii) Rail fence Cipher (iii) Vignere Cipher
4 Perform encryption and decryption using Hill cipher for the following: Message PEN
and key ACTIVATED (Dec 2021)
4 Describe DES algorithm with neat diagram and explain the steps. (Dec 2021)
5 Solve GCD (98,56) using extended Euclidean algorithm. Also, write the algorithm
6 What do you mean by AES? Diagrammatically illustrate the structure of AES and
describe the steps in AES encryption process with example (Dec 2020)
7 Describe in detail the key generation in AES algorithm and its expansion format
8 Describe Triple DES and its applications
9 Explain about the single round of DES algorithm
10 Describe key discarding process of DES
11 Explain the key generation, encryption and decryption of SDES algorithm in detail (Dec 11)
12 Write notes on birthday attack
13 Describe the working principle of simple DES with an example
14 Explain in detail about the entities in the symmetric cipher model with their
requirements for secure usage of the model
15 Demonstrate that the set of polynomials where coefficients form a field is a ring
16 Write detailed note on modular arithmetic
17 Explain the following in detail
Linear cryptanalysis
Differential cryptanalysis
Key distribution
UNIT-III/ PART-A
1 What is public key cryptography?
Public key cryptography (or asymmetric cryptography) is an encryption scheme that uses two
mathematically related, but not identical keys – a public key and a private key. Each key performs a
unique function. The public key is used to encrypt and the private
key is used to decrypt.
2 What is the difference between symmetric key cryptography and public key
cryptography?
Symmetric Key Cryptography Public Key Cryptography
Involves only one key (a secret key) to encrypt and Uses a pair of keys – a public key and a
decrypt the information private key
21 mod 5 2 mod 5 2
22 mod 5 4 mod 5 4
1)
23 mod 5 8 mod 5 3
24 mod 5 16 mod 5 1
41 mod 5 4 mod 5 4
42 mod 5 16 mod 5 1
2)
43 mod 5 64 mod 5 4
44 mod 5 256 mod 5 0
i. p=17, q=11
ii. Calculate n=p*q = 17*11 =187
iii. Calculate (n) = (p-1)(q-1) = 16*10=160
iv. Select e=7
v. Determine d such that de 1(mod 60). The correct value of d is 23
Public key (7,187) and private key (23,187)
Encryption: 887 mod 187 = 11
14 Perform encryption and decryption using the RSA algorithm for the following.
P=7, q=11, e=17 and M=8
i. p=7, q=11
ii. Calculate n=p*q = 7*11 =77
iii. Calculate (n) = (p-1)(q-1) = 6*10=60
iv. Select e=17
v. Determine d such that de 1(mod 60). The correct value of d is 53
Public key (17,77) and private key (53,77)
Encryption: 817 mod 77 = 56
Decryption: 5653 mod 77 = 8
20 Why is asymmetric cryptography bad for huge data? Specify the reasons (May 18)
✓ Asymmetric cryptography takes more time
✓ Key management is difficult
✓ Slower encryption speed due to long keys
21 Give the applications of the public key crypto system
✓ To provide confidentiality (a message that a sender encrypts using the recipients public key
can be decrypted only by the recipient‟s private key
✓ Digital signature (used for sender authentication)
✓ Further applications built on this include: digital cash, password authenticated key
agreement, time-stamping services, non-repudiation protocol, etc.
22 What is the use of Fermat‟s theorem
Fermat‟s theorem is a fundamental theorem in elementary number theory, which helps compute
powers of integers modulo prime numbers.
It is a special case of Euler‟s theorem and is important in applications of elementary
number theory, including primality testing and public key cryptography.
23 Calculate 21102020 (mod 1009) using Fermat‟s theorem.
✓ Are 2110 and 1009 co-prime?
✓ If so, by the theorem 21101008 1 (mod 1009)
27 Find the GCD of (2740, 1760) using Euclid‟s Algorithm. (Dec 2020)
GCD (2740,1760) = GCD (1760,980)
= GCD (980, 780)
= GCD (780, 200)
= GCD (200, 180)
= GCD (180, 20)
= GCD (20, 0)
= 20
28 For p = 11 and q = 19 and choose d = 17. Apply RSA algorithm where Cipher message
= 80 and thus find the plain text. (Dec 2020)
n = pq = 11 × 19 = 209.
C=Me mod n ; C=517 mod 209 ; C = 80 mod 209.So
the plain text is 5
29 What is meet in the Middle Attack? (Dec 2021)
➢ A Meet-in-the-Middle (MitM) Attack is a kind of cryptanalytic attack where the attacker
uses some kind of space or time tradeoff to aid the attack.
➢ MitMs can take the form of dividing the target communication into two so thateach piece can
be addressed individually.
➢ It could mean transforming an attack requiring X amount of time into onerequiring Y time
and Z space. The aim is to significantly reduce the effort needed
to perform a brute-force attack.
UNIT-III / PART-B
1 State Chinese Remainder Theorem and find X for the given set of congruent equations using CRT
X = 2 (mod 3)
X = 3 (mod 5)
X = 2 (mod 7)
2 State and prove Fermat‟s theorem.
3 Explain RSA algorithm, perform encryption and decryption to the system with
p=7, q=11, e=17, M=8
4 Users Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q=83
and a primitive root α=5.
i. If Alice has a private key XA=6, what is Alice‟s public key YA?
ii. If Bob has a private key XB=10, what is Bob‟s public key YB?
UNIT-IV / PART-B
1 Compare the uses of MAC and hash function. Represent them using appropriate
diagrams (Dec 19)
2 List out the advantages of MD5 and SHA algorithms
3 Suggest and explain about an authentication scheme for mutual authentication between
the user and the server which relies on symmetric encryption
4 Explain digital signature standard with necessary diagrams in detail
5 Discuss client server mutual authentication, with example flow diagram
6 Write down the steps involved in (i) Elgamal digital signature scheme (ii) Schnorr digital
signature scheme used for authenticating a person
7 With a neat diagram, explain the steps involved in SHA algorithm for encrypting a message
with maximum length of less than 2128 bits and produces as output a 512-bit
message digest.
8 Discuss the different methods involved in authentication of source.
9 Write about how the integrity of message is ensured without source authentication.
10 Explain the concepts of digital signature algorithm with key generation and verification
in detail.
11 Explain SHA2 in detail
12 Explain Elgamal digital signature schemes.
13 How hash function algorithm m is designed? Explain their features and properties (May 18)
14 Explain briefly about the architecture and certification mechanism in Kerberos and
X.509
15 What is Kerberos? Explain how it provides authenticated services
16 Explain the format of the X.509 certificate in detail (Dec 2021)
17 Explain Kerberos version 4 in detail
18 Briefly explain the steps of message digest generation in Whirlpool with a block diagram
(Dec 2020)
19 Explain PKI management model and its operations with the help of a diagram. (Dec
2020)
20 Describe digital signature algorithm and show how signing and verification is done
using DSS. (Dec 2021)
21 Consider a banking application that is expected to provide cryptographic functionalities. Assume that
this application is running on top of another application wherein the end customers can perform a
single task of fund transfer. The application requires
cryptographic requirements based on the amount of transfer. (Dec 2020)
10 Define Spyware.
Spyware is a type of malware that is installed on computers which collects information about users without
their knowledge. It is clearly understood from the term Spyware that it secretly monitors the user. The
features and functions of such Spywares are beyond simple monitoring.