SRI RAMANUJAR ENGINEERING COLLEGE
DEPARTMENT OF INFORMATION TECHNOLOGY
UNIT TEST –II
CS6701/ CRYPTOGRAPHY AND NETWORK SECURITY
PART-A
- Define diffusion and confusion.How diffusion and confusion is provided in Feistel cipher.
- What are the two methods suggested by Shannon for frustrating statistical cryptanalysis?
- Differentiate between linear cryptanalysis and differential cryptanalysis.
- List the difference between block cipher and stream cipher?
- What is meant by meet-in the middle attack?
- Compare DES and AES?
- What are the possible attacks on RSA algorithm?
- Explain the avalanche effect.
- What is the purpose of the S-boxes in DES?
- Define SAC, BIC and GA.
- What are the six ingredients of Public-key cryptosystems?
- What are three broad categories of application of public-key cryptosystems?
- What requirements must a public key cryptosystems fulfill to be secure algorithm?
- List the three AES evaluation criteria proposed by NIST?
- Differentiate between Public key encryption and Conventional encryption?
PART-B
- (a) Draw the S-DES Key generation diagram. Given 10 bit key K=1010000010.
Determine K1,K2 where
P10=3 5 2 7 4 10 1 9 8 6
P8= 6 3 7 4 8 5 10 9 by using SDES key generation method.(8)
(b) Explain Double DES and Triple DES with neat diagram.(8)
2. (a) Draw the general structure of DES and explain the encryption decryption process. (10)
(b) Mention the strengths and weakness of DES algorithm. (6)
3. (a) Explain RSA algorithm and its security attacks. (10)
(b) Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7 and M=5. (6)
4. Explain AES with suitable diagrams and also discuss AES key Expansion Algorithm? (16)
5. Briefly discuss about Public –key Cryptosystems. (16)
6. Explain the Simplifed DES with neat diagrams.(16)
7. (a) Explain the Single Round of DES in detail.(8)
(b) Explain the various DES Design Criteria for S-box,Permutation P and Function F.(8)
SRI RAMANUJAR ENGINEERING COLLEGE
DEPARTMENT OF INFORMATION TECHNOLOGY
UNIT TEST -II
CS6701/ CRYPTOGRAPHY AND NETWORK SECURITY
PART-A
1.Define diffusion and confusion. How diffusion and confusion is provided in Feistel cipher.
2.What are the two methods suggested by Shannon for frustrating statistical cryptanalysis?
3.Differentiate between linear cryptanalysis and differential cryptanalysis.
4.List the difference between block cipher and stream cipher?
5.What is meant by meet-in the middle attack?
6.Compare DES and AES?
7.What are the possible attacks on RSA algorithm?
8.Explain the avalanche effect.
9.What is the purpose of the S-boxes in DES?
10.Define SAC, BIC and GA.
11.What are the six ingredients of Public-key cryptosystems?
12.What are three broad categories of application of public-key cryptosystems?
13.What requirements must a public key cryptosystems fulfill to be secure algorithm?
14.List the three AES evaluation criteria proposed by NIST?
15.Differentiate between Public key encryption and Conventional encryption?
PART-B
- (a) Draw the S-DES Key generation diagram. Given 10 bit key K=1010000010.
Determine K1,K2 where
P10=3 5 2 7 4 10 1 9 8 6
P8= 6 3 7 4 8 5 10 9 by using SDES key generation method.(8)
(b) Explain Double DES and Triple DES with neat diagram.(8)
2. (a) Draw the general structure of DES and explain the encryption decryption process.(10)
(b) Mention the strengths and weakness of DES algorithm. (6)
3. (a) Explain RSA algorithm and its security attacks. (10)
(b) Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7 and M=5. (6)
4. Explain AES with suitable diagrams and also discuss AES key Expansion Algorithm? (16)
5. Briefly discuss about Public –key Cryptosystems. (16)
6. Explain the Simplifed DES with neat diagrams.(16)
7. (a) Explain the Single Round of DES in detail.(8)
(b) Explain the various DES Design Criteria for S-box,Permutation P and Function F.(8)