The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Similar documents
BCA III Network security and Cryptography Examination-2016 Model Paper 1

Computer Security: Principles and Practice

Cryptography and Network Security

Cryptography MIS

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(2½ hours) Total Marks: 75

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Network Security Chapter 8

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

1.264 Lecture 28. Cryptography: Asymmetric keys

Encryption. INST 346, Section 0201 April 3, 2018

Cipher Suite Configuration Mode Commands

CSE 127: Computer Security Cryptography. Kirill Levchenko

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptographic Concepts

Introduction and Overview. Why CSCI 454/554?

APNIC elearning: Cryptography Basics

Encryption I. An Introduction

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

CSC 774 Network Security

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

KALASALINGAM UNIVERSITY

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

10EC832: NETWORK SECURITY

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Introduction to Cryptography. Vasil Slavov William Jewell College

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Network Security. Chapter 8. MYcsvtu Notes.

Lecture 1 Applied Cryptography (Part 1)

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Computer Security 3/23/18

Verteilte Systeme (Distributed Systems)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

CSC/ECE 774 Advanced Network Security

Symmetric, Asymmetric, and One Way Technologies

Uses of Cryptography

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Public Key Cryptography

Introduction to information Security

CSE484 Final Study Guide

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

14. Internet Security (J. Kurose)

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Spring 2010: CS419 Computer Security

Information Security: Principles and Practice Second Edition. Mark Stamp

PASSWORDS & ENCRYPTION

CSCE 715: Network Systems Security

Computers and Security

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CIS 4360 Secure Computer Systems Symmetric Cryptography

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Computer Networks. Wenzhong Li. Nanjing University

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

EEC-682/782 Computer Networks I

Hash Function. Guido Bertoni Luca Breveglieri. Fundations of Cryptography - hash function pp. 1 / 18

Cryptography and Network Security

David Wetherall, with some slides from Radia Perlman s security lectures.

Cryptography and Network Security. Sixth Edition by William Stallings

Computer Security. 10. Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

Cryptography (Overview)

CRYPTOGRAPHY & DIGITAL SIGNATURE

Security Requirements

Findings for

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers

n-bit Output Feedback

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Some Stuff About Crypto

Summary on Crypto Primitives and Protocols

Cryptography Functions

Encryption Details COMP620

Chapter 15: Security. Operating System Concepts 8 th Edition,

Cisco VPN 3002 Hardware Client Security Policy

Garantía y Seguridad en Sistemas y Redes

CRYPTOGRAPHY AND NETWORK SECURITY

Lecture 4: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

NIST Cryptographic Toolkit

Network Security Essentials Chapter 2

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Computer Security CS 526

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

WAP Security. Helsinki University of Technology S Security of Communication Protocols

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Ref:

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Transcription:

Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). 1. Input message in Cryptography is called; (a) Plain text (b) Cipher Text (c) Plain and cipher (d) None of the above 2. Asymmetric key is also called: (a) Secret key (b) Public key (c) Private key (d) None of the above 3. RSA stands for: (a) Rivest Shamir and Adleman (b) Rock Shane and Amozen (c) Rivest Shane and Amozen (d) Rock Shamir and Adleman 4. A digital signature need a : (a) Public key system (b) Private key system (c) Public and private key system (d) None of the above 5. Which layer filter the proxy firewall: (a) Application (b) Transport layer 6. (c) Network Layer (d) Secure Hash function or algorithm developed by: None of the above (a) NIST (b) IEEE (c) ANSI (d) None of the above...is an encryption method used to offer secure communication by e- 7. mail: (a) Mail server (b) PGP 8. (c) SSL Network security ensures: (d) None of the above

(a) Detecting attacks (b) Preventing attacks 9. (c) Recovering attacks (d) All of the above The process to discover plain text or key is known as: (a) Cryptanalysis (b) Crypto design (c) Crypto processing (d) Crypto graphic 10. Hacking refers to: (a) Data access without permission (b) Data updation without permission (c) Data deletion without permission 11. (d) All of the above. Encryption protects against: (a) Attacks (b) Viruses (c) Manipulation of data (d) All of the above 12. Hash function is used to produce: (a) Finger print of a file (b) Useful for message authentication (d) None of the above 13. Block cipher processes: (a) 1000 bits at a time (b) One bit block of data at a time (d) None of the above 14. Decryption algorithm: (a) Encrypts input data (b) Decrypts the encrypted data 15. (d) None of the above What is the name of the network attack that floods it with useless traffic? (a) Virus (b) Trojan horse 16. (c) DOS attach (d) Spoofing RSA algorithm uses variable sized key that is usually between...and bits. (a) 256,1048 (b) 256, 2048 17. (c) 512, 1048 What is an advantage of RSA over DSS? (d) 512, 2048 (a) It can provide digital signature and encryption functionality (b) It uses fewer resources and encrypts quicker because it uses symmetric keys (c) It is a block cipher versus a stream cipher 18. (d) It employs a one-time encryption pad The codified language can be termed as: (a) Cleartext (b) Unclear text 19. (c) Codetext Cryptology means: (d) Cipher text (a) Cryptology+ Cryptodesign (b) Cryptology Cryptanalysis (c) Cryptograph itself known as cryptology also

20. (d) None of the above The input block length in AES is: (a) 56 bits (b) 64 bits 21. (c) 112 bits (d) 128 bits An attack on a cipher text message where the attacker attempts to use all possible permutations and combinations is called: (a) Brute-Plaintext attack (b) Birthday attack 22. (c) Known-Plaintext attack Hash collision means: (d) Chosen-plaintext attack (a) Two keys for one message (b) One key for two message (c) Two different keys for different message 23. (d) Always the same key Encryption strength is based on: (a) Strength of algorithm (b) Secrecy of key (c) Length of key 24. (d) All of the above In an authentication using symmetric keys, if 10 people need to communicate, we need... Keys. (a) 10 (b) 20 25. (c) 30 (d) 40 In an efficient algorithm for factoring large number is discovered, which of the following schemes will be known to be not secure? (a) Diffle-Hellman (b) RSA 26. (c) AES Session Key establishes: (d) None of the above (a) Logical connection (b) Physical Connection (d) None of the above 27. In the digital signature technique, the sender of the message uses...to create cipher text: (a) Own symmetric key (b) Own private key (c) The receiver's private key 28. (d) Receiver's public key The symmetric (Shared) key in the Diffle-Hellman protocol is: (a) k = g xy and p (b) K = g xy mod q 29. (c) K = (R2)x (d) All of the above Secure socket layer is designed to provide, security and compression services to data granted from... (a) Application Layer (b) Transport Layer 30. (c) Both (a) and (b) (d) None of the above Which of the following is not type of permutation in P-boxes? (a) Plain permutation (b) Straight permutation (c) Expansion permutation 31. (d) Compression permutation Which of the following is not type of permutation in P-boxes? (a) Plain permutation (b) Straight permutation

(c) Expansion permutation 32. (d) Compression permutation SHA-1 is similar to: (a) RSA (b) DES 33. (c) MDS (d) Rijndael Kerberos is an authentication scheme that can used to implement: (a) Public key cryptography (b) Digital signature 34. (c) Hash function Transposition cipher involves: (d) Single sign on (a) Replacement of blocks of text with other blocks (b) Replacement of characters of text with other character (c) Strict row to column replacement 35. (d) Some permutation on the input text to produce cipher text Which of the following is not a block cipher operating mode? (a) ECB (b) CBF 36. (c) OFB (d) CBC If an efficient algorithm for factoring large number is discovered which of this following schemes will be known to be not secure? (a) AES (b) Diffle-Hellman (c) RSA (d) EI Gammal 37. What are MD4 and MD5? (a) Symmetric Encryption Algorithms (b) Asymmetric encryption Algorithms (c) Hashing algorithms (d) Digital certificates 38. TDES means: (a) Triple digital encryption standard (b) Triangular data encryption standard (c) Triple data encryption standard (d) Triangular digital encryption standard 39. If an attacker stole a password file that contained one way encrypted passwords, what type of an attack would he/she perform to find the encrypted password? (a) Man- in-the middle attack (b) Birthday attack (c) Denial of service attack 40. (d) Dictionary attack Masquerade attack is another name of: (a) Virus attack (b) Spoofing (c) DOS attack (d) Trojan Horse Attempt any four descriptive types of questions out of the six. All questions carry 7½ marks each. Q.1 (a) Explain the operation of DES algorithm using diagram. What is the strength of a DES algorithm? (b) Write down AES parameter and explain AES key expansion.

Q.2 (a) Explain collision resistant has functions by taking suitable example. (b) What do you mean by 'Birthday Attack"? Explain. Q.3 (a) What do you mean by pseudo random number generation? Explain (b) What is MAC? What is its use? Q.4 (a) Describe various block cipher operating modes in brief. (b) Differentiate symmetric and asymmetric encryption scheme. Q.5 (a) What is the use of digital signature? What are the requirement of a digital Signature scheme? (b) What is coin flipping? Explain briefly. Q.6 Explain short notes on any three of the following: (a) Proxy firewall (b) One time pad scheme (c) Triple DES (d) SHA-1