Sie sind auf Seite 1von 4

DEPARTMENT OF ELECTRONICS & COMM. ENGG.

B.I.T. MESRA, RANCHI


CP 7043

CRYPTOGRAPHY AND NETWORK SECURITY

Module - 1:
Services, Mechanisms and Attacks, The OSI Security Architecture, A Model for Network Security.
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotol Machines,
Steganography.
Module - 2:
Simplified DES, Block Cipher Principles, The Data Encryption Standard, The Strength of DES,
Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block Cipher Modes of
Operation.
Module - 3:
Groups, Rings, and Fields, Modular Arithmetic, Euclids Algorithm, Finite Fields of the Form GF (p),
Polynomial arithmetic, Finite Fields of the Form GF(2), Placement of Encryption Function, Traffic
Confidentially, Key Distribution, Random Number Generation,
Module - 4:
Testing for Primality, The Chinese Remainder Theorem, Discrete Logarithms, Principles of Public-Key
Cryptosystems, The RSA Algorithm, Prime Numbers, Fermats and Eulers Theorems.
Module 5:
Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions,
Security of Hash Functions and MACs.
Module - 6:
Pretty Good Privacy, S/MIME, Kerberos, X.509 Authentication Service.
Module - 7:
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations, Key Management. Web Security Considerations, Secure Sockets Layer
and Transport Layer Security, Secure Electronic Transaction.
Text Book:
W.Stallings : Cryptography and Network Security : Principles and Practice, 3rd ed.
Pearson Education, New Delhi, 2005

TUTORIAL
CP 7043 - CRYPTOGRAPHY & NETWORK SECURITY
1.

Explain the following terms in Cryptography:


Services (2) Mechanism
(3) Attacks

2.

Discuss the security services of x.800 in the case of OSI Security Architecture.

3.

Discuss the Security Mechanism (x.800).

4.

Explain the Passive Attack and Active Attack.

5.

Discuss the Network Security Model.

6.

What are the essential ingredients of a Symmetric Cipher?

7.

What are the basic functions used in Encryption Algo?

8.

What is the difference between a Block Cipher and a Stream Cipher?

9.

List and briefly define types of Cryptanalytic attacks based on what is known to the attacker.

10.

Briefly define the Caesar Cipher.

11.

Briefly define the Monoalphabetic cipher.

12.

Briefly define the Play fair Cipher.

13.

What is the difference between a Monoalphabetic cipher and Polyalphabetic Cipher?

14.

What is Stegarography?

15.

(a) Encrypt the message meet me at the usual place at then rather than eight
oclock
using the Hill Cipher with the key 9 4). Show your calculations
a. 7) and the result.
(b) Show the calculations for the corresponding decryption of the Cipher Text to recover the
original Plaintext.

16.

What is Sinphified DES? Explain S-DES key generation. S-DES Encryption & role of
function fk.

17.

Why is it important to study the Feistel cipher?

18.

What is a Product Cipher?

19.

What is the difference between diffusion & confusion?

20.

What is the Avalanche effect?

21.

Explain the DES Encryption mechanism.

22.

Explain the DES Decryption mechanism.

23.

What is the difference between differential & linear cryptanalysis?

24.

Discuss the Cipher Design Modes of operation.

25.

Discuss the Block Cipher Modes of operation.

26.

Briefly define a Group, Ring and a Ring.

27.

What is difference between modular arithmetic& ordinary arithmetic?

28.

List the three classes of Polynomial arithmetic.

29.

Using the extended Euclids Algo, find the multiplicative inverse of:
1234 mod 4321
2414 mod 40902

30.

Determine the GCD of the following pairs of Polynomials:


x3+x+1 and x2+x+1 over GF (2)
x3-x+1 and x2+1 over GF (3)

31.

For a user workstation in a typical business environment, list potential location for
confidentiality attacks.

32.

What is the difference between link & end to end encryption?

33.

What are the roles of the public & private key? Explain.

34.

Describe in general terms an efficient procedure for picking a prime no.

35.

What types of attacks are addressed by memory authentication?

36.

What is a message authentication code?

37.

What problems are kerberos designed to address?

38.

What are there threats associated with user authentication over a network or internet?

39.

What four requirements were defined for kerberos?

40.

What is a chain of certificates? Explain

41.

What is purpose of the x.509 statement?

42.

What are the five principle services provided by PGP?

43.

Why does PGP generate a signature before applying compression?

44.

Give examples of applications of H sec.

45.

Using S-DES decsypt the string (10100010) using the key (0111111101)
byhand. Show intermediate results after each function (IP, Fk, SW, Fk, IP-1).
Then douta the find 4 bits of the plaintext string to a letter & the second 4 bits to
another letter where we encode A through P in base 2.
(i.c. A = 0000, B = 0001, ---, P = 1111).

Das könnte Ihnen auch gefallen