0% found this document useful (0 votes)
54 views3 pages

Questions Bank

Uploaded by

bodanaji5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Questions Bank

Uploaded by

bodanaji5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question Bank

Subject: Information Security


Unit – 1 & 2
25 3 7
1. Consider a Hill cipher with m=3 with key K=[ 5 9 21 ]
11 8 13
What is the ciphertext corresponding to the plaintext “VOWEL”? – 4 marks
2. Define the term information security. List and briefly define the categories of security
attacks and services. – 7 marks
3. Using Vigenere cipher, encrypt the word ‘cryptography’ using the key house. – 4 marks
4. How security of polyalphabetic cipher is improved over monoalphabetic cipher? – 4
marks
5. The encryption key in a transposition cipher is (3,2,6,1,5,4). Find the decryption key. – 4
marks
6. Explain different type of cryptanalytic attack based on the amount of information known
to the cryptanalyst. – 7 marks
7. Using the playfair matrix with the key “Lieutenant” encrypt the message “nest in tree”. –
3 marks
8. A generalization of the Caesar cipher, known as the affine Caesar cipher where ciphertext
letter C= E([a,b],p) = (a*p + b) mod 26, and [a,b] is the key. A basic requirement for any
encryption algorithm is that it be one-to-one. That is, if p ≠q, then E(k, p) ≠ E(k, q). The
affine Caesar cipher is not one-to-one for all values of 'a'. For example, for a = 2 and b =
3, then E([a,b], 0) = E([a, b], 13) = 3.
Are there any limitations on the value of 'b'? Prove why or why not. – 4 marks
9. Explain one time pad (OTP). What is the drawback of OTP? – 4 marks

Unit – 3

1. Explain internal structure of single round of DES algorithm. – 7 marks


2. Describe SubBytes, ShiftRows, MixColumns, AddRoundKey in AES (Advanced
Encryption standard). – 7 marks
3. What is the purpose of S-boxes in DES? Explain the avalanche effect. – 3 marks
4. Compare the substitution in AES and DES. Why do we have only one substitution
table(S-box) in AES, but several in DES? – 3 marks
5. Explain the byte substitution in AES (Advanced Encryption Standard). – 4 marks
6. What is diffusion and confusion? Explain Fiestel encryption and decryption. – 7 marks
7. Compare the permutations in DES and AES. Why expansion and compression
permutations are needed in DES, but not in AES? – 3 marks
8. How diffusion and confusion is achieved in DES (Data Encryption Standard)? Explain
single round of DES algorithm. – 7 marks
9. Differentiate between block cipher and stream cipher. List out and briefly explain
parameters and features on which Feistel structure is dependent – 7 marks
10. Differentiate between differential and linear cryptanalysis. – 4 marks
11. Explain inputs for single AES round. – 7 marks
12. Explain AES key expansion. – 7 marks
13. Explain meet-in the-middle attack. Explain Triple DES with two keys. – 7 marks
14. Explain Electronic codebook mode (ECB) and Cipher block chaining mode (CBC). – 7
marks
15. Explain cipher feedback mode (CFB) and output feedback mode (OFB). – 7 marks
16. Explain Cipher feedback mode (CFB) and counter mode. – 7 marks

Unit – 4 & 5

1. Explain public key cryptosystem and compare conventional encryption with public key
encryption. – 7 marks
2. What are the requirements for public key cryptography? Explain cryptanalysis for public-
key. – 7 marks
3. Explain the following two issues of the complexity of the computation required to use
RSA. – 7 marks
i) Encryption/decryption
ii) Key generation.
4. RSA algorithm is vulnerable to which cryptanalytic attack? Justify your answer. – 3
marks
5. Write the possible approaches to attack RSA. – 7 marks
6. Two prime numbers for RSA are 11 and 17. Value of e is 7. Find the public key and
private key using RSA algorithm. – 4 marks
7. Explain Deffie Hellman key exchange scheme in detail. – 4 marks
8. Explain man-in-the-middle attack for Deffie Hellman key exchange. – 4 marks

Unit – 6

Hash Function
1. Write the three desirable properties of hash functions. – 4 marks
2. Write the properties needed for a hash function H to be useful for message authentication.
Is hash function resistant against birthday attack? – 7 marks
3. How can we use block ciphers as Hash functions? – 4 marks
4. What is the difference between weak and strong collision resistance? Explain the general
principle used in all hash functions. – 7 marks
5. Explain Message digest generation using SHA (Secure Hash algorithm). – 7 marks
6. Illustrate various ways in which a hash code can be used to provide message
authentication. – 7 marks

MAC
1. What types of attacks are addressed by message authentication? – 4 marks
2. What is message authentication code? Describe the situations in which message
authentication code is used. – 7 marks
3. What are some approaches to produce message authentication? – 7 marks
4. Write MAC (Message Authentication code) requirements. – 4 marks

Digital Signature
1. What is the difference between direct and arbitrated digital signature? – 3 marks
2. What are the properties digital signatures should have? Write digital signature
algorithm. – 7 marks
3. What are some threats associated with a direct digital signature scheme? – 4 marks

Unit – 7
1. What is the difference between link and end-to-end encryption? – 3 marks
2. Explain the key distribution scenario in which each user shares a unique master key with
key distribution centre. – 4 marks
3. What is the difference between a session key and a master key? – 3 marks
4. Explain decentralized key distribution – 3 marks
5. What are the different methods for distributing public keys? – 7 marks
6. Explain symmetric key distribution using asymmetric encryption. – 7 marks
7. Discuss about lifetime of a session key – 3 marks
8. List out and explain PKIX management functions. – 7 marks
9. Explain X.509 certificates formats. – 7 marks

Unit – 8
1. Explain different types of replay attacks. What are the different methods to cop up with
replay attacks? – 7 marks
2. What is suppress-replay attack? – 3 marks
3. What is the difference between mutual authentication and one-way authentication? – 4
marks
4. Explain remote user authentication technique using Kerberos. – 7 marks
5. Explain remote user authentication technique using Asymmetric encryption. – 7 marks
6. What is the role of ticket granting server and authentication server in Kerberos? – 4 marks

You might also like