ACADEMY OF TECHNOLOGY
Internal Examination, Even Semester, 2023
Paper name: Cryptography & Network Security Paper Code: PEC-CS801B / PEC-IT801B
Discipline: CSE/ IT Semester: 8th
Group A
1. MCQ type questions.
i. The process of writing the text as diagonals and reading it as sequence of rows is
called as
(a)Rail Fence Technique (b) Caesar Cipher
(c) Mono-alphabetic Cipher (d) Homophonic Substitution Cipher
ii. The mechanism of writing text as rows and reading as columns is called
as_______
(a) Vernam Cipher
(b) Caesar Cipher
(c) Simple Columnar Transposition Technique
(d) Homophonic Substitution Cipher
iii. Vernam Cipher is also called as
(a) Rail Fence Technique
(b) One-time pad
(c) Book Cipher
(d) Running Key Cipher
iv. DES encrypts blocks of ________ bits.
(a) 32 (b) 56 (c) 64 (d) 128
v. There are _________ rounds in DES.
(a) 8 (b) 10 c) 14 (d) 16
vi. _________is based on the IDEA algorithm.
(a) S/MIME (b) PGP (c) SET (d) SSL
vii. A _______ is used to verify the integrity of a message.
(a) message digest (b) decryption algorithm
(c) digital envelope (d) none of the above
viii. _________ increases the redundancy of plain text.
(a) Confusion (b) Diffusion (c) Both confusion and diffusion
(d) Neither confusion nor diffusion
ix. ______________ works on block mode.
(a) CFB (b) OFB (c) CCB (d) CBC
x. When two different message digests have the same value, it is called as
(a) attack (b) collision (c) hash (d) none of the above
xi. The final solution to the problem of key exchange is the use of_____
(a) passport (b) digital envelope
(c) digital certificate (d) message digest
xii. In asymmetric key cryptography,_______ keys are required per communicating
(a) 2 (b) 3 (c) 4 (d) 5
xiii. If A and B want to communicate securely with each other, B must not know
(a) A’s private key (b) A’s public key
(c) B's private key (d) B's private key
xiv. If A and B want to communicate securely with each other, B must not know
(a) A’s private key (b) A’s public key (c) B's private key (d) B's private key
Group B
2. Explain substitution, transposition cipher and product cipher.
3. Describe Diffie-Hellman Symmetric Key Exchange algorithm.
4. What are CFB and OFB mode? Explain the significance of a network security model.
5. Explain RSA algorithm with example. In the public-key system using RSA, you intercept the
cipher text CT=10 sent to a user whose public key is E=5, N=35.
6. Explain the principles of IDEA algorithm.
7. Explain the significance of SHA-1.
8. How MD5 algorithm works?
9. Why do you use digital signature? What are digital certificates?
10. What protocols contain SSL?
11. What are the key requirements of message digest?
12. How is SHTTP different from SSL?
13. Discuss how encryption happens in RC5.