CCS PT2-QB
CCS PT2-QB
CCS PT2-QB
Question Bank
Part-A
1. Why is asymmetric cryptography bad for huge data? Specify the reason
2. What is a primitive root of a number?
3. Perform encryption and decryption using RSA algorithm for the following. p=7, q=11; e=17;
m=8.
4. Using the properties of discrete logarithms, show how to solve the following congruence: x 2
≡ 36 (mod 77).
5. State Fermat’s little theorem
6. Define the term message digest.
7. How do you specify various types of authentication protocol?
8. State any three requirements for authentication.
9. Assume a client C wants to communicate with a server S using Kerberos protocol.
Explain How can it be achieved?
10. What is cyber security?
11. What is the category of cybercrime?
12. List the privacy facts of web security problem
13. List the need for information Security
14. Prepare any one technique attacking in RSA
15. Summarize the Classes of message authentication function.
16. How digital signatures differ from authentication protocols?
17. Define cybercrime
18. Which are the elements of cyber crime?
19. Why is asymmetric cryptography bad for huge data? Specify the reason
20. Design the role of Ticket Granting Server in inters realm operations of Kerberos.
21. Create a simple authentication dialogue used in Kerberos
22. Define virus. Specify the types of viruses?
PART –B
23. Users Alice and Bob use the Diffie-Hellman key exchange technique with a common
prime q = 83 and a primitive root α = 5.
i)If Alice has a private key XA = 6, what is Alice’s public key YA? (6)
ii) If Bob has a private key XB = 10, what is Bob’s public key YB? (6) iii)Construct the
shared secret key(4)
24. Perform encryption and decryption using RSA algorithm for p=17, q=11,e=7 m=88.
25. Develop the process of deriving eighty 64-bit words from 1024 bits for processing Of a single
blocks and also discuss single round function in SHA-512 algorithm. Show the values of
W16, W17, W18 and W19
26. Apply the concepts involved in Signature generation and Verification functions of DSS.
27. Explain the types of Cyber Crime in detail with a neat block diagram
28. Explain in detail about the types of cyber-attacks.
29. Perform encryption and decryption using RSA algorithm for p=17, q=11,e=7 m=88.
30. Users A and B use the Diffie-Hellman key exchange technique, a common prime q=11 and a
primitive root alpha=7.
(i)If user A has private key XA=3.What is A’s public key YA? (6) (ii)If user B has private
key XB=6. What is B’s public key YB?(6)
(iii) What is the shared secret key? Also write the algorithm. (4)
31. How Hash function algorithm is designed? Explain their features and properties
32. (i)Enumerate the properties of Hash Function. (8)(ii)Create the authentication protocol and
list its limitations, how the limitations overcome(8)
33. How to identify the credit card fraud system? Explain in detail
34. Explain in detail about the password cracking and types of attacks in password cracking
35. Users A and B use the Diffie-Hellman key exchange technique, a common prime
q=11 and a primitive root alpha=7.
36. How Hash function algorithm is designed? Explain their features and properties
Question Pattern
PART –C (3 X 16 = 48 Marks)