1. Explain data confidentiality, data authentication and data integrity.
2. Explain generation of encryption matrix in play fair cipher.
3. Explain ceasor cipher.
4. Apply brute force on ceasor cipher
“PHHWPHDIWHUWKHWRJDSDUWB.
5. Explain one time pad cipher with example.
6. Explain rail fence Cipher technique
7. Explain transposition technique with
multiple round
8. Apply brute force on ceasor cipher
“FOBIQYYN”
9. Define the term – confusion,
diffusion
10. Use Hill cipher to encrypt the text
DEF. The key to be used is
2 4 5
9 2 1
3 8 7
11. Using
playfair cipher encrypt the plaintext “Why, don’t you?”. Use the key “keyword”.
12. Use
hill cipher to encrypt text pay. The key to be used is
17
17 5
21
18 21
2
2 19
13. Using
playfair cipher encrypt the plaintext “balloon” use the key “Monarchy”.
14. Using
playfair cipher encrypt the plaintext “mynameisatul” use the key “playfair
example”
15. Use
hill cipher to encrypt the text cat. The key to be used is
6
29 1
13
16 10
20
17 15
16. Using
playfair cipher encrypt the plaintext “mynameisatul” use the key “harsh”.
17. What
is the difference between passive and active security threats? List and briefly
define categories of passive and active security attacks.
18. Define
the term cryptanalysis. Explain various types of cryptanalytic attacks.
19. Give
examples of replay attacks. List three general approaches for dealing with
replay attacks.
20. Encrypt
the message “Exam” using the Hill cipher with the key
2 4 5
9 2 1
3 8 7
21. When
an encryption scheme is said to be unconditionally secure and computationally secure?
22. Which
type of substitution is called monoalphabetic substitution cipher?
23. Which
two principal methods are used in substitution ciphers to lessen the extent to
which the structure of the plaintext survives in the ciphertext?
24. Use
playfair algorithm with key “monarchy” and encrypt the text “jazz”.
25. What
is security Services? Explain any three types of security services
26. Explain
Vegenere Cipher.
27. What is security mechanism? List
and explain various security mechanism.
28. Explain the conventional security
model used for information security.
29. Explain cryptanalysis. Discuss any
one technique for it
30. What attacks can be done on
encrypted text? Explain them.
31. Explain
play fair cipher with suitable example.
32. Define the
terms threat and attack. List and briefly define categories of security
attacks.
33. List and
briefly define the security services.
34. Construct a
playfair matrix with the key “occurrence”. Generate the cipher text for the plaintext “Tall trees”
35. Define the
terms diffusion and confusion. What is the purpose of S-box in DES?
36. Explain the
avalanche effect in DES.
37. Explain
monoalphabetic cipher and polyalphabetic cipher by giving an example.
38.
What is cryptography?
39.
With example explain function of
s-box in DES.
40.
Explain various steps of AES in
short.
41.
Explain
AES in detail
42.
Explain
key generation in AES.
43.
Explain
S-box generation in AES.
44.
Explain single round of DES algorithm.
45.
Explain the steps involved in
International data encryption standard algorithm
46.
Explain scheme for DES encryption.
47.
Define Block Cipher. Explain Design
Principles of block cipher.
48.
Explain DES algorithm with Figure.
49.
Explain Sub key generation Process in
Simplified DES algorithm with Example.
50.
Explain limitation of DES in detail.
51.
Explain linear and differentical
cryptanalysis?
52.
What is SAC and BIC?
53.
Explain double DES.
54.
Explain triple DES with two and three
keys.
55.
What is meet in the middle attack?
56.
Explain cipher feedback mode of operation
57.
Explain Modes of Operations.
58.
Why mode of operation is defined? Explain the block
cipher modes of operation?
59.
Explain Diffie - Hellman key exchange
algorithm with example.
60.
What is man in the middle attack explain with
example.
61.
Explain RSA algorithm with example.
62.
The
encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and
public key (e) is 3. Calculate the decryption key and calculate the ciphertext
if the given plaintext is 7.
63.
Perform encryption using the RSA
algorithm.
p=3,q=11(two random numbers).
e(encryption key)=7
M(plaintext message)=5
64.
What
is primitive root? Explain Diffi-Hellmen key exchange algorithm with proper example.
65.
Elaborate various kinds of attacks on RSA
algorithm.
66.
Explain computational aspects of RSA.
67.
Compare
public key and private key cryptography. Also list various algorithms for each
68.
Briefly
explain the model
of Asymmetric Cryptosystem.
69.
Explain RSA algorithm and list the possible
approaches to attacking it.
70.
Perform
encryption and decryption
using the RSA
algorithm for p=3,q=11, e=7, M=5.
71.
Compare conventional encryption with public key
encryption.
72.
What is a trap-door
one-way function? What is its importance in public key cryptography?
73.
Briefly explain Diffie-Hellman key exchange. Is it
vulnerable to man in the middle attack? Justify.
74.
What is the
difference between weak
and strong collision resistance?
75.
What characteristics are needed in a
secure hash function?
76.
Write the properties of hash functions.
77.
Explain SHA512 Algorithm.
78.
Explain hash function requirement and
security.
79.
What characteristics are needed in a secure hash
function?
80.
What
is MAC? Explain HMAC.
81.
How
following can be
achieved with message
authentication: Message authentication, Message authentication and
confidentiality
82.
How message authentication code can be
used to achieve message authentication and confidentiality
83.
Explain MAC based on Block cipher.
84.
What are the advantages of HMAC.
85.
Explain MAC function requirement and security.
No comments:
Post a Comment