Vous êtes sur la page 1sur 2

UNIT II

Year : 2014-2015

CRYPTOSYSTEMS &
AUTHENTICATION

Sem.: EVEN

Subject Code:

NE 7202

Branch

ME-CSE

Subject Name:

NETWORK AND INFORMATION SECURITY

Year/Sem

I/ II

PART A
1.
2.
3.
4.
5.
6.
7.
8.

What are the essential ingredients of a symmetric cipher?


What are the two basic functions used in encryption algorithms?
How many keys are required for two people to communicate via a cipher?
What is the difference between a block cipher and a stream cipher?
What is the difference between a mono alphabetic and a poly alphabetic cipher?
Compare Substitution and permutation techniques? Give an example.(Dec 2014)
Convert the text ANNA UNIVERSITY into cipher text using rail fence technique.
Decode by Caesar cipher using frequency analysis with shift +6
KGYEZUHXKGQ(May 2014)
9. How will you perform attack on Hill Cipher?
10.List out the problems and its disadvantage of one time pad encryption algorithm?
11.What is meant by affine cipher?
12.What is meant by block cipher? Give the five modes of operation of Block cipher.
13.What are the design parameters of Feistel cipher network?
14.What are two problems with the one-time pad?
15.What is a transposition cipher?
16.What is the difference between diffusion and confusion? (Dec 2014)
17.Which parameters and design choices determine the actual algorithm of a Feistel cipher?
18.What types of attack are addressed by DES algorithm?
19.What are the advantages and disadvantages of double DES?
20.What are the different modes of operation in DES?
21.If a bit error occurs in plain text block p1, how far does the error propagate in CBC mode of
DES and 8-bit CFB mode of DES?
22.What is the disadvantage with ECB mode of operation?
23.What is the purpose of the S-boxes in DES?
24.What is the purpose of the State array?
25.What is the difference between Sub Bytes and Sub Word?
26.What is the difference between Shift Rows and Rot Word?
27.How shifting of rows and mixing of columns takes place in AES
28.What is meant by Linear Cryptanalysis?
29.What is meant by Linear Differential Cryptanalysis-?
30.What is the difference between differential and linear cryptanalysis?
31.What do you meant by hash function? List some of hash algorithm.
32.What are the requirements of the hash function?
33.Differentiate internal and external error control.
34.What is the role of compression function in hash function?(May 2014)
35.What is the difference between weak and strong collision resistance?
36.In what ways can a hash value be secured so as to provide message authentication?
37.Define the one way property to be possessed by any hash function?
38.What is the block size of SHA512 and how many bits are produced as the message digest?
39.What is message authentication? Specify the requirements for message authentication.
40.What are the two important key issues related to authenticated key exchange?
41.Define the classes of message authentication function.
42.Differentiate MAC and Hash function?

43.Mention the fundamental idea of HMAC.


44.Differentiate MAC and Hash function.
45.What are the types of attacks are addressed by message authentication?
46.What is meant by message authentication code? List the roles of Authentication services.
47.List the Authentication requirements.
48.What is x.509 standard? List the authentication procedure of X. 509.

PART B
1.
2.
3.
4.

17
Explain in detail about classical crypto systems.
Explain any two types of cipher Technique in detail.
21
Describe in detail about Substitution ciphers with examples
Consider the plaintext PAYMOREMONEY and use the encryption key
2

18

21

K=
2

5. Explain in detail about linear cryptanalysis and differential cryptanalysis. (May 2014)
6. Write short notes on the following with example
i) Ceaser cipher
ii) mono
alphabetic cipher.
iii) Play fair cipher
iv) poly alphabetic cipher
v)
vernam cipher
vi) Transposition method.
7. Explain the of DES algorithm and triple DES in detail. (Dec 2014)
8. Discuss about DES in detail. Describe the Key Generation, Encryption and Decryption and
working principle
9. (i)Explain about the Single round of DES algorithm
(ii)Write down the triple DES algorithm and explain with neat diagram.
10.(i)Explain in Detail about Modes of operation (May 2014)
11.(ii)Mention the strengths and weakness of DES algorithm.
12.(i)Describe in detail about Advanced Encryption standard
(ii)In AES, how the encryption key is expanded to produce keys for the 10 rounds
13.Describe about Hash functions in detail.
14.Write short notes on the following
i) SHA-1
ii)MD5
(May 2014)
15.Illustrate about the SHA 512 algorithm, explain round function operation and equations of
single round (May 14)
16.Discuss about the types of MAC with example diagrams.
17.Write short notes on the following
i) MAC
ii)Hash function
18.Write short notes on the following
i) HMAC
ii) SHA-512
19.Explain authentication functions and authentication Protocol in detail.
20.Explain X.509 authentication service and its certificates.

Prepared by:

Verified by:

M.Azhagiri.
Asst.Prof./ CSE

Dr. U.V. Arivazhagu


HOD/ CSE

Vous aimerez peut-être aussi