All posts from

IT2352 Cryptography And Network Security Question Bank : dmice.ac.in

Name of the College : DMI College OF Engineering
Subject : Cryptography And Network Security
Website : dmice.ac.in
Document type : Question Bank

Download Cryptography And Network Security Model Question Paper : https://www.pdfquestion.in/uploads/dmice.ac.in/1372-IT2352.doc

DMI Cryptography & Network Security Question Paper

Unit – I

PART – A
1. What are active and passive attacks that compromise information security? (May/June 2014)
2. Why random number are used in network security? (May/June 2014)
3. Define Euler’s theorem. (May/June 2014)
4. List out the problems of one-time pad. (Nov/Dec 2011)

Related :  DMI College OF Engineering IT2031 Electronic Commerce B.E Question Bank : www.pdfquestion.in/2780.html

5. What is the difference between a block cipher and a stream cipher?(Apr/May 2009)
6. Define Finite field. (Apr/May 2012)
7. What is the use of Fermat’s theorem? (Apr/May 2011)
8. What is the difference between an unconditionally secure cipher and a computationally secure cipher? (Apr/May 2008)
9. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher? (Nov/ Dec 2012)
10. What is cryptology? (Apr/May 2007)
11. Briefly define the Caesar cipher. (Apr/May 2009)
12. What is a transposition cipher? (Apr/May 2008)(May/June 2012)
13. How many keys are required for two people to communicate via a cipher? (Nov/Dec 2009)
14. Why is it not practical to use an arbitrary reversible substitution cipher? (Apr/May 2011)
15. Define threat and attack. (Nov/Dec 2009)


16. Define LSFR Sequence. (May/June 2012)
17. What are the two basic functions used in encryption algorithms? (Apr/May 2009) (May/June 2012)
18. Give the types of attack. (Nov/Dec 2011)
19. Briefly define the play fair cipher. (Apr/May 2011)
20. What is cryptanalysis and cryptography? (Nov/ Dec 2009)
21. Write down the purpose of the S-Boxes in DES. (Nov/Dec 2011)
22. What do you mean by differential cryptanalysis? (Apr/May 2012)
23. Define factoring. (Apr/May 2012)
24. What is triple encryption? (Nov/Dec 2009)
25. Name any two methods for testing prime numbers. (Apr/May 2011)
26. Define: Diffusion and Confusion (Nov/Dec 2011)
27. What was the final set of criteria used by NIST to evaluate candidate AES ciphers? (Apr/May 2008)
28. What is the difference between differential and linear cryptanalysis? (Apr/May 2011)
29. Briefly describe Shift Rows. (Apr/May 2006) (Apr/May 2011)
30. Define primitive root. (Nov/Dec 2012)
31. What is an Avalanche Effect? (Nov/Dec 2012)
32. What are the different modes of operation in DES? (April/May 2011)
33. List out the parameters of AES. (Nov/Dec 2011)
34. Define Primality Testing. (Nov/Dec 2011)
35. State the difference between conventional encryption and public-key encryption. (Nov/Dec 2011)
36. What are the disadvantages of double DES? (Nov/Dec 2012)
37. What is the purpose of the State array? (Apr/May 2008)
38. How is the S-box constructed? (Apr/May 2006)
39. Briefly describe Sub Bytes. (Nov/Dec 2009)
40. How many bytes in State are affected by Shift Rows? (Apr/May 2009)

Unit – II

PART – B :
1. Discuss the classical cryptosystems and its types. (Apr/May 2011)
2. Describe Linear Feedback Shift Registers Sequences. (May/June 2014)
3. Describe Chinese Remainder Theorem with an example. (April/May 2011)
4. Explain the following with suitable example: (Nov/Dec 2012)
(i) Congruences (8)
(ii) Modular Exponentiation (8)
5. (i) Briefly explain the security attacks and security services. (Nov/Dec 2007)
(ii) Explain briefly about Fermat and Euler’s Theorem. (Nov/Dec 2012)
6. Discuss about the Finite Fields with their application in cryptography. (May/June 2014)
7. Explain the different types of cipher techniques in detail. (May/June 2012)
8. Explain briefly the Legendre and Jacobi Symbols.
9. Describe Continued fractions in detail.
10. (i) Using play fair cipher algorithm encrypt the message using the key “MONARCHY” and explain in detail. (Nov/Dec 2011)
(ii) Explain the ceaser cipher and mono alphabetic cipher (Nov/Dec 2011)
11. Describe the working principle of Simple DES. (April/May 2014)
12. (i) Explain about RC4 Algorithm. (10) (May/June 2012)
(ii) Briefly explain factoring. (6)
13. Explain RSA algorithm. Demonstrate encryption and decryption for the RSA algorithm parameters: p=3, q=11, e= 7, d=? , M=5. (April/May 2014)
14. In AES, explain how the encryption key is expanded to product keys for the 10 rounds. (April/May 2008).
15. Explain briefly about block cipher modes of operation. (Nov/Dec 2007)
16. (i) Explain triple DES in detail. (10) (April/May 2008).
(ii) Briefly explain Primality Testing. (6)
17. Describe the of DES algorithm in detail. (April/May 2011)

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap