0 valutazioniIl 0% ha trovato utile questo documento (0 voti)

262 visualizzazioni10 pagineJul 30, 2016

© © All Rights Reserved

PDF, TXT o leggi online da Scribd

© All Rights Reserved

0 valutazioniIl 0% ha trovato utile questo documento (0 voti)

262 visualizzazioni10 pagine© All Rights Reserved

Sei sulla pagina 1di 10

com

VALLIAMMAI ENGINEERING COLLEGE

SRM Nagar, Kattankulathur-603203

DEPARTMENT OF INFORMATION TECHNOLOGY

Academic Year: 2016 -17

QUESTION BANK - ODD SEMESTER

SUBJECT CODE

SEMESTER

YEAR

DEPARTMENT

HANDLED & PREPARED BY

CS6701

VII

IV

Information Technology

Mr.S.Sekar, A.P(Sr.G) & Mr.K.Elaiyaraja, A.P(Sr.G)

UNIT I

PART-A

Q.No Question

Competence

Level

Understanding

BTL-2

Define Steganography

Remembering

BTL-1

Remembering

BTL-1

Define cryptanalysis.

Remembering

BTL-1

Analysing

BTL-4

Analysing

BTL-4

Analysing

BTL-4

Applying

BTL-3

Remembering

BTL-1

10

Understanding

BTL-2

11

Define cryptography

Remembering

BTL-1

12

Evaluating

BTL-5

13

Understanding

BTL-2

14

Applying

BTL-3

15

Understanding

BTL-2

16

CMTMROOEOORW (Hint: Algorithm-Rail fence)

Creating

BTL-6

17

Applying

BTL-3

18

Understanding

BTL-2

19

Convert the Given Text VALLIAMMAI into cipher text using Rail fence

Technique.

Evaluating

BTL-5

20

Prepare the list of keys are required for two people to communicate via a cipher?

Creating

BTL-6

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 1 of 10

www.vidyarthiplus.com

PART-B

Q.No Question

(i)State and Drive Fermats theorem & Eulars theorem (8)

(ii)Explain the different security mechanisms focused by OSI security

architecture (8)

(i) Describe the substitution Techniques in detail (8)

2

(ii) Describe the Transposition Techniques in detail (8)

(i) What are the different types of attacks? Explain. (8)

3

(ii) State and explain Chinese remainder theorem with example. (8)

(i)

(i)Find 321 mod 11 using Fermats theorem. (4)

4

(ii)Find GCD using Eulars Theorem with Example. (6)

(ii)Find GCD of 1070 and 1066 using Euclid algorithm. (6)

(i)Encrypt the message PAY using hill cipher with the following key matrix

and show the decryption to get original plain text.(8)

| 17 17 5 |

5

K= | 21 18 21 |

| 2 2 19 |

(ii)Explain classical encryption techniques with symmetric cipher model.(8)

Explain the following in detail

6

(i) Modular Exponentiation (8)

(ii) Finite fields (8)

(i)Given Cipher text YMJTYMJWXNIJTKXNQJSHJ, knowing the message is

7

encrypted by Caesar cipher and k=5. Try to decrypt the message.

(8)

(ii)Using Vigenere cipher, encrypt the word explanation using the key leg. (8)

(i)Discuss briefly the Discrete Algorithms. (8)

8

(ii)Explain the following.

Groups, Rings and Field .

(8)

Differentiate between transposition cipher and substitution cipher. Apply two

9

stage transpositions Cipher on the treat diagrams as single units using the

keyword sequence.

(i)What is Steganography? Briefly explain any three techniques used. (8)

10

(ii)What is mono-alphabetic cipher? How it is different from Caesar cipher? (8)

(i) State the rules to perform encryption using playfair cipher and encrypt

snowshooos using monarchy I and J count as one letter and x is the filler

11

letter.(8)

(ii)Encrypt the word Semester Result with the keyword Examination using

playfair cipher.(8)

(i)With a neat block diagram, Generalize the network security model and the

important parameters associated with it.(8)

12

(ii)Distinguish between active and passive security attacks. Categorize these

attacks and explain one examples of each (8)

(i) (i) State and explain Chinese Remainder theorem. Using the same, find an

integer that has a remainder of 3 when divided by 7,4 when divided by 13 but

13

is divisible by 12. (8)

(ii) (ii) Discuss the Euclids Algorithm. (8)

(i)Explain the following

a) Message Integrity (2)

b) Denial of Service (2)

14

c) Availability (2)

d) Authentication (2)

(ii)To find 1113 mod 53 using modular exponentiation. (8)

1

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Understanding

BTL-2

Remembering

BTL-1

Remembering

BTL-1

Evaluating

BTL-5

Creating

&

Analyzing

BTL-6

&

BTL-4

Understanding

BTL-2

Applying

BTL-3

Understanding

&

Understanding

BTL-2

Analyzing

BTL-4

Remembering

BTL-1

Applying

BTL-3

Creating

&

Analyzing

BTL-6

&

BTL-4

Analyzing

BTL-4

Remembering

BTL-1

Page 2 of 10

www.vidyarthiplus.com

UNIT II

PART-A

Q.No Question

Competence

Level

Define RC5.

Remembering

BTL-1

Remembering

BTL-1

exchange.

Analyzing

BTL-4

Understanding

BTL-2

Understanding

BTL-2

Why is the middle portion of triple DES a decryption rather than encryption?

Analyzing

BTL-4

Remembering

BTL-1

Justify.

Analyzing

BTL-4

Applying

BTL-3

10

What is triple encryption? How many keys are used in triple encryption?

Understanding

BTL-2

11

Remembering

BTL-1

12

Creating

BTL-6

13

Applying

BTL-3

14

Understanding

BTL-2

15

Remembering

BTL-1

16

List four general characteristics of schema for the distribution of the public key.

Applying

BTL-3

Evaluating

BTL-5

Evaluating

BTL-5

17

18

algorithm?

Perform encryption and decryption using RSA algorithm for the following.

p=7, q=11; e=17; m=8

19

Creating

BTL-6

20

Remembering

BTL-1

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 3 of 10

www.vidyarthiplus.com

PART-B

Q.No Question

1

2

3

4

5

10

11

12

13

14

(i) Explain in detail, the key generation in AES algorithm and its expansion format.

(8)

(ii) Explain Triple DES and its applications.(8)

Describe the following modes of operation in block cipher.

(i) Electronic code book and Cipher block chaining. (8)

(ii) Cipher feedback mode and output feedback mode. (8)

(i) Explain about the single Round of DES algorithm. (10)

(ii) Describe the key discarding process of DES. (6)

(i) Explain the RC5 method used for encryption and decryption(8)

(ii) Explain Triple DES and its applications.(8)

(i)Draw the general structure of DES and explain how encryption and decryption are

carried out.(12)

(ii) Mention the strength of DES algorithm.(4)

(i)How meet in Meet in middle attack is performed on double Data Encryption

Standard.(8)

(ii)Explain the substitution bytes transformation and add round key transformation of

AES cipher(8)

(i) Explain how encryption is done using advanced encryption standard with

necessary diagram(8)

(ii)Explain in detail about Blowfish .(8)

Users A and B use the Diffie- Hellman key exchange technique, a common prime

q=11 and a primitive root alpha=7.

(i) If user A has private key XA=3.What is As public key YA?

(ii)If user B has private key XB=6. What is Bs public key YB?

(iii) What is the shared secret key? Also write the algorithm.

(i) Explain RSA Algorithm.(8)

(ii)Demonstrate the encryption and decryption for the RSA algorithm parameters.

P=3, Q=11, E=7, d=?, M=5. (8)

(i) Discuss how discrete logarithm evaluated for a number? What is the role of

discrete log in the Diffie-Hellman key exchange in exchanging the secret key among

two users?(8)

(ii)What are elliptic curves? And also summarize how the elliptic curves are useful

for Cryptography?(8)

(i)Briefly explain the idea behind Elliptic Curve Cryptosystem.(8)

(ii)Explain the key management of public key encryption in detail.(8)

Describe the mathematical foundations of RSA algorithm. Perform encryption

decryption for the following.

P=17, q=7, e=5, n=119, message=6. Use Extended Euclids algorithm to find the

private key.

(i) User A and B use Diffie-Hellman key exchange a common prime q=71 and a

primitive root a=7.

If user A has private key XA=5, What is As public key YA

If user A has private key XB=12, What is Bs public key YB and What is shared

secret key? (8)

(ii)Consider the elliptic curve E11 (1, 6); that is the curve is defined by y2=x3+x+6

with a modules of P=11. Determine all the points in E11 (1, 6). Start by calculation

the right hand side of the equation of all the values of n? (8)

(i)Explain briefly about Diffie-Hellman key exchange algorithm with its pros and

cons. (10)

(ii) What is public key cryptography and when is it preferred?(6)

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Remembering

BTL-1

Analyzing

BTL-4

Creating

BTL-6

Remembering

BTL-1

Remembering

BTL-1

Analyzing

BTL-4

Understandin

g

BTL-2

Evaluating

BTL-5

Understandin

g

BTL-2

Understandin

g

BTL-2

Remembering

BTL-1

Applying

BTL-2

Applying

BTL-3

Analyzing

BTL-4

Page 4 of 10

www.vidyarthiplus.com

UNIT III

PART-A

Q.No

Question

Competence

Level

Understanding

BTL-2

Remembering

BTL-1

Analyzing

BTL-4

Remembering

BTL-1

Creating

BTL-6

Remembering

BTL-1

Evaluating

BTL-5

Understanding

BTL-2

Remembering

BTL-1

10

Remembering

BTL-1

11

Understanding

BTL-2

12

Analyzing

BTL-4

13

Differentiate between message authentication code and one way hash function.

Evaluating

BTL-5

14

Applying

BTL-3

15

Understanding

BTL-2

16

Creating

BTL-6

17

Remembering

BTL-1

18

Analyzing

BTL-4

19

Applying

BTL-3

20

Applying

BTL-3

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 5 of 10

www.vidyarthiplus.com

PART-B

Q.No Question

1

2

3

4

5

6

(i)Where hash functions are used? What characteristics are needed in secure hash

function? write about the security of hash functions and MACs.(8)

(ii)Examine Digital signature with ElGamal public key cryptosystem.(8)

Describe digital signature algorithm and show how signing and verification is

done using DSS.

Explain the process of deriving eighty 64-bit words from 1024 bits for processing

Of a single blocks and also discuss single round function in SHA-512 algorithm.

Show the values of W16, W17, W18 and W19.

What is Digital Signature? Explain how it is created at the sender end and

retrieved at receiver end .differentiate digital signature from digital certificate.

(i)Describe HMAC algorithm in detail.(8)

(ii)Explain the classification of authtication function in detail.(8)

(i)Compare the features of SHA and MD5 algorithm(8)

(ii)Discuss about the objectives of HMAC and its security features(8)

Competence

Level

Remembering

BTL-1

Remembering

BTL-1

Evaluating

BTL-5

Understanding

BTL-2

Understanding

BTL-2

Creating

BTL-6

How MD5 method provide security to the system?Explain with suitable diagram.

Analyzing

BTL-4

Remembering

BTL-1

What is meant by message digest and explain about HMAC digital signatures

Remembering

BTL-1

10

detail.(12)

(ii) Compare its performance with MD5.(4)

Applying

BTL-3

11

Understanding

BTL-2

Applying

BTL-3

Analyzing

BTL-4

Analyzing

BTL-4

12

13

14

(ii)Demonstrate any one method of efficient implementation of HMAC. (8)

(i) Explain in detail message authentication code and its requirements.(8)

(ii) With a neat flowchart, Explain MD5 processing of a single 512 bit block.(8)

(i)Enumerate the properties of Hash Function.(8)

(ii)Describe the authentication protocol and list its limitations, how the

limitations overcome.(8)

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 6 of 10

www.vidyarthiplus.com

UNIT IV

PART-A

Q.No Question

Competence

Level

Evaluating

BTL-5

Analyzing

BTL-4

Applying

BTL-3

Analyzing

BTL-4

Define Worm.

Remembering

BTL-1

Applying

BTL-3

protocol .How can it be achieved?

Analyzing

BTL-4

What is intruder?

Applying

BTL-3

Remembering

BTL-1

10

Define: SET

Remembering

BTL-1

11

Understanding

BTL-2

12

Creating

BTL-6

13

Define firewall.

Remembering

BTL-1

14

Understanding

BTL-2

15

Understanding

BTL-2

16

Remembering

BTL-1

17

Remembering

BTL-1

18

Evaluating

BTL-5

19

What is the role of Ticket Granting Server in inter realm operations of Kerberos?

Creating

BTL-6

20

Understanding

BTL-2

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 7 of 10

www.vidyarthiplus.com

PART-B

Q.No Question

1

2

3

4

5

6

10

11

12

13

14

with necessary diagrams.

(i) Explain the Firewall design principles.(8)

(ii) What are viruses? Explain the virus related threats and the counter measures

applied.(8)

Explain the various practical implementation of cryptography and security in

detail

(i) Explain the technical details of firewall. (8)

(ii)Illustrate the three common types of firewalls with diagrams. (8)

Explain in detail about Secure Electronic Transaction with neat diagram

(i)Discuss on the significant types of virus categories. (8)

(ii)What is a trusted system? Explain the basic concept of data access control in

trusted systems. (8)

(i) Explain briefly the architecture of distributed intrusion detection system with

the necessary diagrams. (8)

(ii) Explain about virus and related threats in detail. (8)

(i) Generalize the role of intrusion detection system? Point out the three benefits

that can be provided by the intrusion detection system? (8)

(ii) Prepare comparison details between statistical anomaly detection and rule

based intrusion detection system? (8)

(i)Explain the various roles of firewalls and related terminology in detail (8)

(ii)How does screened host architecture for firewalls differ from screened subnet

firewall architecture? Which offer more security for the information assets

remain on the trusted network? Explain with neat sketch?(8)

(i)Explain the roles of the different servers in Kerberos protocol. How does the

user get authenticated to the different servers?(8)

(ii)Explain briefly about trusted systems.(8)

(i) Classify the various measures that may be used for intrusion detection. (8)

(ii) Show How the encryption is key generated from password in Kerberos? (8)

(i)Explain with the help of an example how a users certificate is obtained from

another certification authority in X.509 scheme. (8)

(ii)Describe the authentication dialog used by Kerberos for obtaining services

from another realm. (8)

(i)List out the participants of SET system, and explain in detail. (8)

(ii)Explain firewalls and how they prevent intrusions(8)

Describe the different types of firewalls and its configuration in detail

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Competence

Level

Understanding

BTL-2

Analyzing

BTL-4

Evaluating

BTL-5

Remembering

BTL-1

Remembering

BTL-1

Understanding

BTL-2

Analyzing

BTL-4

Analyzing

BTL-4

Analyzing

BTL-4

Understanding

BTL-2

Applying

BTL-3

Remembering

BTL-1

Applying

BTL-3

Remembering

BTL-1

Page 8 of 10

www.vidyarthiplus.com

UNIT V

PART-A

Q.No Question

Competence

Level

Understanding

BTL-2

Understanding

BTL-2

Define S/MIME.

Remembering

BTL-1

Remembering

BTL-1

Analyzing

BTL-4

Remembering

BTL-1

Understanding

BTL-2

Analyzing

BTL-4

Remembering

BTL-1

10

Remembering

BTL-1

11

Understanding

BTL-2

12

Remembering

BTL-1

13

Creating

BTL-6

14

Applying

BTL-3

15

Understanding

BTL-2

16

How can the signed data entity of S/MIME be prepared? Write the steps

Applying

BTL-3

17

Evaluating

BTL-5

18

Remembering

BTL-1

19

Applying

BTL-3

20

Understanding

BTL-2

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 9 of 10

www.vidyarthiplus.com

PART-B

Q.No

1

3

4

5

6

7

8

10

11

12

13

14

Question

(i) How does PGP provide authentication and confidentiality for email services

and for file transfer applications? Draw the block diagram and explain the

components. (8)

(ii) Explain the general format of PGP message. (8)

(i) Summarize the Operations of PGP? Brief the various services provided by

PGP. (8)

(ii) Discuss the threats faced by an e-mail and explain its security requirements

to provide a secure e-mail service.(8)

(i) Describe about the PKI. (8)

(ii) Describe the ISAKMP format with diagrams.(8)

(i) Summarize about the authentication header of IP.

(8)

(ii) Discuss about encapsulating security payload of IP

(8)

(i) List the different protocols of SSL. Explain in detail Handshake protocol.(8)

(ii) Tell how does the server get authenticated to client in SSL?(8)

Explain IPSec protocols in detail .Also develop applications and advantages of

IPSec.

(i) What is the importance of web security? Explain how secure socket layer

provides the reliable service.(8)

(ii) Briefly explain about Transport Level Security.(8)

(i) Sketch and analyze the IPSec Document Overview diagram.

(8)

(ii) Draw and explain PGP Cryptographic function for Authentication.

(8)

(i) What is PGP? Examine how authentication and confidentiality is maintained

in PGP. (8)

(ii) Explain the key rings and its significance in PGP. Show how the message

generation from sender to receiver and explain with suitable diagram. (8)

(i) Draw the IP security authentication header and describe the functions of each

field. (8)

(ii) What is transport mode and tunnel mode authentication in IP? Describe how

ESP is applied to both these modes? (8)

(i) What do you mean by Security Association? Illustrate the parameters that

identify the Security Association. (8)

(ii) What is a dual signature and what is its purpose? With neat block diagram

illustrate the Secure Electronic Transaction.(8)

(i) Differentiate between transport modes vs. tunnel mode encryption in

IPsec.(8)

(ii) With a neat diagram, Describe handshake protocol in SSL.(8)

(i) Analyze the Cryptographic algorithms used in S/MIME. (8)

(ii) Explain S/MIME certification processing. (8)

(i) Describe importance of RADIX-64 conversion. (8)

(ii) Describe IP security Architecture. (8)

Verified by

: 1.

[

3.

[

Approved by HOD

Competence

Level

Evaluating

BTL-5

Understanding

BTL-2

Remembering

BTL-1

Understanding

BTL-2

Remembering

BTL-1

Creating

BTL-6

Remembering

BTL-4

Analyzing

BTL-4

Applying

BTL-3

Remembering

BTL-1

Applying

BTL-3

Understanding

BTL-2

Analyzing

BTL-4

Remembering

BTL-1

2.

[

4.

[

***************

SS & KE / IT

CS6701- CNS

www.Vidyarthiplus.com

Page 10 of 10

## Molto più che documenti.

Scopri tutto ciò che Scribd ha da offrire, inclusi libri e audiolibri dei maggiori editori.

Annulla in qualsiasi momento.