Sei sulla pagina 1di 2

Jayamatha Engineering College Department Of Computer Science and Engineering

Sub.Code/Name:IT62-Cryptography and Network Security

Part-A: 1. 2. 3. 4. 5.

UNIT-1

What is cryptanalysis and cryptography? Define threat and attack? Differentiate active attack and passive attack and give example. What is denial of service? Solve using polyalphabetic cipher Key:MEC Plaintext:WE NEED MORE SUPPLIES FAST 6. Solve using playfair cipher. Key:playfair example Plaintext: Hide the gold in the tree stump 7. What is traffic padding? What is its purpose? 8. Define Eulers theorem and its application. 9. State Fermats theorem. Give an example? 10. Define: Integrity, Access control 11. Define: Confidentiality. 12. Differentiate between data confidentiality and data integrity. 13. Define: Finite field. 14. Differentiate between authentication and authorization. 15. Solve the following simultaneous congruence using Chinese Remainder Theorem: X1mod2, X1mod3 16. Find 3201mod11 using Fermats theorem. 17. Find gcd(1970,1066).

Part-B: 1. 2. 3. 4. Explain classical Crypto system with neat sketch.(12) Briefly discuss various security services. (12). List out and explain different types of cryptanalytic attacks with suitable example.(12) i)Explain different types of security attacks with suitable example.(6) ii)Define and illustrate Chinese Remainder theorem.(6). 5. Define the Chinese remainder theorem and its applications. Find the value of x for the following sets of congruence using Chinese remainder theorem.(12) i)x2mod7 and x3mod9 ii)x4mod5 and x10mod11

UNIT-II

1. Write the parameters and design that determines the actual algorithm of Fiestel Cipher? 2. What is avalanche effect? 3. How do you determine that a given number is prime or not? 4. What do you mean by differential cryptanalysis? 5. What for Miller-Rabin algorithm is used? 6. What is the purpose of S-boxes in DES? 7. Generate keys k1 and k2 for simplified DES if k=0110111100 8. If a bit error occurs in plain text block P1, how far does the error propagate in CBC mode of DES? 9. What is the strength of DES algorithm? 10. What is double DES? What kind of attack makes it almost useless? 11. Write the advantage of triple DES algorithm. 12. What are the possible attacks in RSA algorithm? 13. What is primitive root of n? 14. Explain the term meet-in-the-middle attack? 15. What is the difference between a block cipher and stream cipher? 16. Define : factoring

Part-B 1. 2. 3. 4. 5. 6. Describe the Fiestel cipher structure.(12) Explain in detail the transformations that take place in DES encryption.(12) Discuss elaborately the various cipher block modes of operation .(12) Give a brief explanation on AES transformations.(12) Write notes on Triple DES.(6) Discuss RSA with computations for Public key cryptography and also perform the encryption and decryption for P=7,q=11,e=17 and m=8.(12) 7. In RSA system, the public key of a given user is e=31,n=3599. what is the private key of this user? Also describe the algorithm.(12) 8. Perform encryption/decryption using RSA algorithm for the following P=3; q=11; e=7; m=5.(12) 9. Discuss the algorithms used for testing primality.(8) 10. Describe the security of RSA.(8) 11. Explain about RC4 algorithm(12)

Potrebbero piacerti anche