Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views19 pages

CNS Question Paper

dfghj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views19 pages

CNS Question Paper

dfghj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 19

Department of Computer Science & Engineering

Subject Name: Cryptography and Network Security(22CS756PC)


Name of the Faculty: Mr. G. ShivaPrasad, Mrs. Waheda Khanam
Year / Sem : IV-CSE-A, B & C

Unit-wise questions:
UNIT-I
Multiple choice Questions
1. Which of the following is not a principle of security?
a) Confidentiality
b) Integrity
c) Availability
d) Visibility
Answer: d) Visibility
2. The process of converting plain text into cipher text is called:
a) Decryption
b) Encryption
c) Key exchange
d) Steganography
Answer: b) Encryption
3. Which of the following is an example of a substitution technique?
a) Rail Fence cipher
b) Caesar cipher
c) Columnar transposition
d) Vigenère cipher
Answer: b) Caesar cipher
4. Steganography is used to:
a) Encrypt data
b) Hide data
c) Compress data
d) Decrypt data
Answer: b) Hide data
5. Which key is used in symmetric key cryptography?
a) Single key
b) Pair of keys
c) Private key only
d) Public key only
Answer: a) Single key
6. Transposition techniques are based on:
a) Rearrangement of letters
b) Substitution of letters
c) Key generation
d) Hashing
Answer: a) Rearrangement of letters
7. Which of the following is not a type of security attack?
a) Passive attack
b) Active attack
c) Direct attack
d) Replay attack
Answer: c) Direct attack
8. Plain text is:
a) Encrypted text
b) Decrypted text
c) Original readable message
d) Compressed text
Answer: c) Original readable message
9. Which cryptography uses two keys for encryption and decryption?
a) Symmetric key cryptography
b) Transposition technique
c) Asymmetric key cryptography
d) Steganography
Answer: c) Asymmetric key cryptography
10. Which of the following is a security mechanism?
a) Encipherment
b) Authentication
c) Integrity
d) Availability
Answer: a) Encipherment
11. Which of the following is NOT a principle of security?
a) Confidentiality
b) Integrity
c) Complexity
d) Availability
Answer: c) Complexity
12. Which security approach focuses on preventing attacks before they occur?
a) Reactive security
b) Proactive security
c) Passive security
d) Active security
Answer: b) Proactive security
13. Which attack involves interception and modification of data?
a) Passive attack
b) Active attack
c) Simple attack
d) Null attack
Answer: b) Active attack
14. The process of converting plain text to cipher text is called:
a) Hashing
b) Encryption
c) Decryption
d) Encoding
Answer: b) Encryption
15. Which technique hides the existence of a message rather than encrypting it?
a) Steganography
b) Substitution
c) Transposition
d) Hashing
Answer: a) Steganography
16. Which of the following is a substitution cipher?
a) Caesar cipher
b) Rail fence cipher
c) Columnar transposition
d) Vernam cipher
Answer: a) Caesar cipher
17. In asymmetric key cryptography, the keys used are:
a) Same keys for encryption and decryption
b) Different keys for encryption and decryption
c) No keys used
d) Secret shared keys only
Answer: b) Different keys for encryption and decryption
18. The main purpose of encryption is to ensure:
a) Availability
b) Integrity
c) Confidentiality
d) Authenticity
Answer: c) Confidentiality
19. Which of the following is NOT a type of security service?
a) Confidentiality
b) Integrity
c) Access control
d) Replay attack
Answer: d) Replay attack
20. The strength of encryption mainly depends on:
a) Key size
b) Number of users
c) Algorithm name
d) Plain text size
Answer: a) Key size
21. What is cipher text?
a) Original message
b) Encrypted message
c) Message digest
d) Digital signature
Answer: b) Encrypted message
22. Which of the following is a type of transposition cipher?
a) Vigenère cipher
b) Vernam cipher
c) Columnar cipher
d) Caesar cipher
Answer: c) Columnar cipher
23. Passive attacks include:
a) Modification of message
b) Replay attacks
c) Traffic analysis
d) Denial of Service
Answer: c) Traffic analysis
24. Which principle of security ensures data is accessible to authorized users when
needed?
a) Integrity
b) Confidentiality
c) Availability
d) Authenticity
Answer: c) Availability
25. The security mechanism that ensures the identity of the sender is known as:
a) Confidentiality
b) Authentication
c) Integrity
d) Non-repudiation
Answer: b) Authentication

UNIT-I: Fill in the Blanks


1. The process of converting cipher text back to plain text is called decryption.
2. Steganography hides the existence of a message.
3. Confidentiality ensures that information is not disclosed to unauthorized persons.
4. In symmetric key cryptography, the same key is used for both encryption and
decryption.
5. Integrity ensures that data is not altered during transmission.
6. Substitution techniques replace characters with other characters.
7. Transposition techniques rearrange the positions of characters.
8. An attack that attempts to alter system resources is called an active attack.
9. The original readable data is called plain text.
10. Public key cryptography uses two keys: public and private key.
11. Encryption is the process of converting plain text into unreadable form.
12. Availability ensures that resources are accessible when needed.
13. Cipher text is the unreadable form of the original message.
14. Key size determines the strength of encryption.
15. A model for network security involves sender, receiver, trusted third party, and
security transformations
16. The process of converting cipher text back into plain text is called decryption.
17. Confidentiality ensures that information is accessible only to those authorized to
have access.
18. Integrity ensures that information is not altered during transmission.
19. Encryption is used to convert plain text into cipher text.
20. Substitution techniques replace characters of the plain text with other characters.
21. Transposition techniques rearrange the positions of characters in the plain text.
22. Steganography hides the existence of a message within another medium.
23. In symmetric key cryptography, the same key is used for both encryption and
decryption.
24. Asymmetric key cryptography uses a pair of keys – public and private.
25. Cipher text is the unreadable form of the original message.
26. Active attacks involve modification of the data stream.
27. Passive attacks involve only monitoring of data without modification.
28. The key size determines the strength of the cryptographic algorithm.
29. Availability ensures that authorized users have access to information when required.
30. Replay attack is an example of an active attack.

Descriptive Questions
1.Define and explain the principles of security (Confidentiality, Integrity, Availability, etc.).
Provide real-world examples to illustrate each principle.
2. What are the different types of security attacks? Classify and explain each with suitable
examples. How can organizations protect themselves from these attacks?
3. Describe various security services as defined by ISO. How do these services contribute to a
secure communication system?
4. Explain the different security mechanisms used in computer networks. Illustrate how each
mechanism addresses one or more security threats.
5. With the help of a neat diagram, explain a general model for network security. What are the
components of this model and how do they interact?
6.What is cryptography? Differentiate between plaintext and ciphertext with suitable
examples. Explain the basic goal of cryptography.
7. Discuss in detail the substitution techniques used in classical cryptography. Illustrate with
examples such as Caesar Cipher and Monoalphabetic Cipher.
8. Explain transposition techniques with examples. How do these techniques differ from
substitution techniques in terms of security?
9. What is encryption and decryption? Explain the general process of encryption and
decryption with a neat block diagram.

10. Compare symmetric key cryptography with asymmetric key cryptography. Discuss their
advantages, disadvantages, and use cases

UNIT-II
Multiple choice Questions
1. Which of the following is a block cipher?
a) RC4
b) DES
c) Vernam cipher
d) Vigenère cipher
Answer: b) DES
2. The key size of DES is:
a) 56 bits
b) 64 bits
c) 128 bits
d) 32 bits
Answer: a) 56 bits
3. Which algorithm uses variable key sizes up to 448 bits?
a) AES
b) Blowfish
c) IDEA
d) RC5
Answer: b) Blowfish
4. Which cipher is a stream cipher?
a) DES
b) AES
c) RC4
d) Blowfish
Answer: c) RC4
5. What is the block size of AES?
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
6. Which algorithm uses rounds that depend on the key size?
a) RC5
b) DES
c) Blowfish
d) IDEA
Answer: a) RC5
7. Which of the following is NOT a symmetric key algorithm?
a) DES
b) RSA
c) AES
d) RC4
Answer: b) RSA
8. In RSA, encryption and decryption are performed using:
a) Same key
b) Different keys (public and private)
c) No key
d) Secret shared key only
Answer: b) Different keys (public and private)
9. Diffie-Hellman key exchange is used for:
a) Encrypting data
b) Signing data
c) Exchanging keys securely
d) Hashing data
Answer: c) Exchanging keys securely
10. Which algorithm is based on the difficulty of factoring large prime numbers?
a) DES
b) RC5
c) RSA
d) Blowfish
Answer: c) RSA
11. IDEA algorithm uses a key size of:
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
12. Which algorithm is based on modular exponentiation and discrete logarithm
problem?
a) RSA
b) Elgamal
c) DES
d) RC4
Answer: b) Elgamal
13. Knapsack algorithm is based on:
a) Factorization problem
b) Discrete logarithm problem
c) Subset sum problem
d) Permutation problem
Answer: c) Subset sum problem
14. AES is also known as:
a) Rijndael
b) RC5
c) IDEA
d) Blowfish
Answer: a) Rijndael
15. Which algorithm is widely used in SSL for key exchange?
a) DES
b) RC4
c) Diffie-Hellman
d) Blowfish
Answer: c) Diffie-Hellman
16. Which of the following is a block cipher?
a) RC4
b) DES
c) Vigenère cipher
d) Vernam cipher
Answer: b) DES
17. What is the key size of DES?
a) 64 bits
b) 56 bits
c) 128 bits
d) 192 bits
Answer: b) 56 bits
18. AES algorithm was developed as:
a) RC4
b) Rijndael
c) Blowfish
d) IDEA
Answer: b) Rijndael
19. Which algorithm has a variable key size up to 448 bits?
a) AES
b) Blowfish
c) DES
d) RC5
Answer: b) Blowfish
20. Which cipher is a stream cipher?
a) RC4
b) AES
c) DES
d) Blowfish
Answer: a) RC4
21. RC5 uses:
a) Fixed key size
b) Fixed number of rounds
c) Variable key size and number of rounds
d) Stream cipher technique
Answer: c) Variable key size and number of rounds
22. IDEA algorithm uses a key size of:
a) 64 bits
b) 56 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
23. Which of the following is not a symmetric key cipher?
a) DES
b) AES
c) RSA
d) RC5
Answer: c) RSA
24. Which public key cryptosystem is based on factorization of large prime
numbers?
a) DES
b) RC4
c) RSA
d) Blowfish
Answer: c) RSA
25. Diffie-Hellman algorithm is used for:
a) Encryption
b) Digital signature
c) Key exchange
d) Hashing
Answer: c) Key exchange
26. Elgamal cryptography is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
27. Knapsack algorithm is based on:
a) Discrete logarithm problem
b) Subset sum problem
c) Factorization problem
d) Permutation problem
Answer: b) Subset sum problem
28. Which of the following is a block cipher operation mode?
a) CFB
b) RC4
c) Vigenère
d) Vernam
Answer: a) CFB
29. The block size of AES is:
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
30. RSA is an example of:
a) Symmetric key algorithm
b) Stream cipher
c) Block cipher
d) Asymmetric key algorithm
Answer: d) Asymmetric key algorithm
UNIT-II: Fill in the Blanks
1. DES uses a key size of 56 bits for encryption.
2. Blowfish algorithm supports variable key sizes up to 448 bits.
3. RC4 is an example of a stream cipher.
4. AES has a fixed block size of 128 bits.
5. RSA algorithm is an example of asymmetric key cryptography.
6. In Diffie-Hellman key exchange, two parties securely exchange keys.
7. IDEA algorithm uses a key size of 128 bits.
8. Block ciphers encrypt data in fixed-size blocks.
9. Stream ciphers encrypt data one bit or byte at a time.
10. RC5 algorithm uses variable block sizes, key sizes, and number of rounds.
11. Elgamal cryptography is based on discrete logarithms.
12. Knapsack algorithm is based on the subset sum problem.
13. AES algorithm was originally called Rijndael.
14. In RSA, the public key is used for encryption and private key for decryption.
15. DES operates on 64-bit blocks of data.
16. DES uses a key size of 56 bits for encryption.
17. AES algorithm was developed as Rijndael.
18. Blowfish supports key sizes up to 448 bits.
19. RC4 is an example of a stream cipher.
20. IDEA uses a key size of 128 bits.
21. RC5 has a variable block size, key size, and number of rounds.
22. Block ciphers encrypt data in fixed-size blocks.
23. Stream ciphers encrypt data bit by bit or byte by byte.
24. RSA algorithm is based on factorization of large primes.
25. Diffie-Hellman is used for key exchange.
26. Elgamal cryptography is based on discrete logarithms.
27. Knapsack algorithm is based on subset sum problem.
28. AES has a block size of 128 bits.
29. In RSA, encryption and decryption are done using public and private keys.
30. CFB is a mode of block cipher operation.

Descriptive Questions
1.Describe the Data Encryption Standard (DES) algorithm in detail. Include key size, number
of rounds, and the structure of the Feistel network.
2. Discuss the Advanced Encryption Standard (AES) algorithm with a neat diagram. Explain
its key sizes, rounds, and different transformation steps used during encryption and
decryption.
3. What is Blowfish cipher? Explain the design of Blowfish, its key features, and why it is
considered a secure block cipher.
4. Explain different modes of operation of block ciphers such as ECB, CBC, CFB, OFB, and
CTR. What are their use cases and comparative strengths/weaknesses?
5. Describe the RSA algorithm in detail. Explain key generation, encryption, and decryption
processes with an example. What are the security aspects and limitations of RSA?
6. Discuss the Diffie-Hellman Key Exchange algorithm. How does it allow two parties to
securely exchange keys over an insecure channel? Support your answer with an example.
7. What is the Knapsack cryptographic algorithm? Explain its working principle with an
example. Why is it no longer widely used in modern cryptographic systems?
8. Compare symmetric and asymmetric cryptographic techniques in terms of speed, key
management, security, and practical usage scenarios.
9. Explain RSA Algorithm with An Example?
10. Discuss the Diffie-Hellman Key Exchange algorithm with an Example?

UNIT-III
Multiple choice Questions
1. What is the main purpose of a cryptographic hash function?
a) Encryption
b) Key exchange
c) Data integrity
d) Digital signature only
Answer: c) Data integrity
2. Which of the following is a widely used hash function?
a) DES
b) SHA-512
c) RSA
d) RC4
Answer: b) SHA-512
3. What is the output size of SHA-512?
a) 128 bits
b) 256 bits
c) 384 bits
d) 512 bits
Answer: d) 512 bits
4. HMAC is used for:
a) Encryption
b) Hashing
c) Message authentication
d) Key generation
Answer: c) Message authentication
5. Which of the following is a message authentication code based on block ciphers?
a) HMAC
b) CMAC
c) SHA-512
d) RSA
Answer: b) CMAC
6. Digital signatures provide:
a) Confidentiality only
b) Integrity only
c) Authentication and non-repudiation
d) Encryption
Answer: c) Authentication and non-repudiation
7. Elgamal Digital Signature Scheme is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
8. Which of the following is a protocol for network authentication?
a) RSA
b) Kerberos
c) SHA-512
d) HMAC
Answer: b) Kerberos
9. X.509 is used for:
a) Generating keys
b) Message authentication
c) Digital certificates and authentication
d) Hashing data
Answer: c) Digital certificates and authentication
10. Public Key Infrastructure (PKI) is used for:
a) Data compression
b) Key management and distribution
c) Stream cipher generation
d) Symmetric key encryption
Answer: b) Key management and distribution
11. Kerberos uses:
a) Public key encryption only
b) Symmetric key encryption
c) Stream cipher
d) Asymmetric key encryption only
Answer: b) Symmetric key encryption
12. Which of the following provides confidentiality, integrity, and authenticity in
message communication?
a) Hash function
b) Message authentication code
c) Digital signature
d) Encryption
Answer: c) Digital signature
13. In HMAC, the underlying function used is:
a) Block cipher
b) Stream cipher
c) Hash function
d) Public key encryption
Answer: c) Hash function
14. Which service is used for distributing public keys securely?
a) Kerberos
b) X.509
c) SHA-512
d) HMAC
Answer: b) X.509
15. CMAC stands for:
a) Code-based Message Authentication Code
b) Cipher-based Message Authentication Code
c) Combined Message Authentication Code
d) Certified Message Authentication Code
Answer: b) Cipher-based Message Authentication Code
16. What is the main purpose of cryptographic hash functions?
a) Encryption
b) Decryption
c) Message integrity
d) Key generation
Answer: c) Message integrity
17. Which of the following is a property of hash functions?
a) Hash value is variable length
b) Easy to reverse
c) One-way and collision-resistant
d) Uses private keys
Answer: c) One-way and collision-resistant
18. What is the output size of SHA-512?
a) 128 bits
b) 256 bits
c) 384 bits
d) 512 bits
Answer: d) 512 bits
19. HMAC is used for:
a) Encryption
b) Hashing only
c) Message authentication
d) Key exchange
Answer: c) Message authentication
20. Which of the following is a message authentication code based on block ciphers?
a) HMAC
b) SHA-512
c) CMAC
d) RSA
Answer: c) CMAC
21. Digital signatures provide:
a) Confidentiality only
b) Authentication and non-repudiation
c) Encryption only
d) Hashing only
Answer: b) Authentication and non-repudiation
22. Elgamal Digital Signature Scheme is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
23. Which protocol is used for secure network authentication?
a) RSA
b) Kerberos
c) SHA-512
d) HMAC
Answer: b) Kerberos
24. X.509 standard is used for:
a) Hashing
b) Key generation
c) Digital certificates and authentication
d) Message encryption
Answer: c) Digital certificates and authentication
25. Public Key Infrastructure (PKI) provides:
a) Stream cipher generation
b) Key management and distribution
c) Data compression
d) Hashing services
Answer: b) Key management and distribution
26. Kerberos protocol uses:
a) Public key encryption
b) Symmetric key encryption
c) Stream cipher
d) Hashing only
Answer: b) Symmetric key encryption
27. In HMAC, the underlying function used is:
a) Block cipher
b) Stream cipher
c) Hash function
d) Public key encryption
Answer: c) Hash function
28. Which service distributes public keys securely?
a) Kerberos
b) X.509
c) SHA-512
d) CMAC
Answer: b) X.509
29. CMAC stands for:
a) Code-based Message Authentication Code
b) Cipher-based Message Authentication Code
c) Certified Message Authentication Code
d) Combined Message Authentication Code
Answer: b) Cipher-based Message Authentication Code
30. Which of the following ensures that the sender cannot deny the message sent?
a) Encryption
b) HMAC
c) Digital signature
d) Hash function
Answer: c) Digital signature

UNIT-III: Fill in the Blanks


1. SHA-512 produces a hash output of 512 bits.
2. HMAC stands for Hash-based Message Authentication Code.
3. CMAC is based on block cipher algorithms.
4. Digital signatures provide authentication and non-repudiation.
5. Elgamal Digital Signature Scheme is based on discrete logarithm problem.
6. Kerberos is a protocol that uses symmetric key encryption for network
authentication.
7. X.509 is used for managing digital certificates and public keys.
8. Public Key Infrastructure (PKI) is used for key management and distribution.
9. Message Authentication Codes (MACs) ensure data integrity and authenticity.
10. In HMAC, a hash function is used with a secret key to authenticate messages.
11. SHA-512 is a part of the SHA-2 family of hash functions.
12. Kerberos authenticates users using a trusted third party called Key Distribution
Center (KDC).
13. PKI uses Certificate Authorities (CAs) to issue certificates.
14. Digital signatures are generated using the sender's private key.
15. Key management involves generation, distribution, and storage of cryptographic
keys.
16. SHA-512 produces a hash output of 512 bits.
17. HMAC stands for Hash-based Message Authentication Code.
18. CMAC is based on block cipher algorithms.
19. Digital signatures provide authentication and non-repudiation.
20. Elgamal Digital Signature Scheme is based on discrete logarithm problem.
21. Kerberos is a protocol that uses symmetric key encryption for authentication.
22. X.509 standard is used for managing digital certificates and public keys.
23. Public Key Infrastructure (PKI) manages key generation, distribution, and
certification.
24. Message Authentication Codes (MACs) ensure data integrity and authenticity.
25. HMAC combines a hash function with a secret key.
26. SHA-512 is a part of the SHA-2 family of hash algorithms.
27. Kerberos uses a trusted third party called Key Distribution Center (KDC).
28. PKI uses Certificate Authorities (CAs) to issue digital certificates.
29. Digital signatures are created using the sender's private key.
30. Key management involves generation, distribution, storage, and revocation of
cryptographic keys.
Descriptive Questions
1. Explain the concept of message authentication. Why is message authentication
necessary even when encryption is used?
2. Describe the working of the Secure Hash Algorithm (SHA-512). What are its key
characteristics, such as block size, output size, and internal structure?
3. Describe the working of HMAC (Hashed Message Authentication Code). Explain
its structure, how it combines a cryptographic hash function with a secret key, and
its security benefits.
4. Explain CMAC (Cipher-based Message Authentication Code). How is it different
from HMAC, and what are its advantages in symmetric key cryptography?
5. Compare HMAC and CMAC in terms of their structure, security, and
performance. In which scenarios would one be preferred over the other?

You might also like