CSSqnsmodulewise
CSSqnsmodulewise
1. Define cryptography.
5. List and explain types of attacks (e.g., cipher-text only, known-plaintext, chosen-plaintext).
15. List various types of security applied on a database. (from Q1b in PDF1)
2. Explain DES algorithm (block size, key size, expansion, S-boxes, attacks).
3. Explain modes of block ciphers: ECB, CBC, CFB, OFB, CTR. (ECB & CBC explicitly)
Computational Tasks:
• Playfair cipher:
o Encrypt “The key is hidden under the door” with keyword “domestic.” (PDF2 Q3b)
o Encrypt “The algorithm name is playfair cipher” with keyword “example.” (PDF6
Q2b)
• RSA exercises:
o Given p=7, q=17, E=5, encrypt P=5 and decrypt the ciphertext. (PDF1 Q4a)
o User A (public key = (7, 119)), User B (public key = (13, 221)): compute both private
keys; A sends m=10 to B, produce ciphertext; formulate authentication key. (PDF2
Q2a)
5. Explain HMAC.
6. What is CMAC?
7. What properties are required for a secure hash function? (PDF2 Q6c)
6. Explain SSL/TLS: protocols, handshake, record, change-cipher spec. (PDF2 Q3a / PDF4
Q5a)
12. What is a firewall? Types & layers. (PDF1 Q1d / PDF6 Q6a)
1. Substitution techniques
4. RSA algorithm
5. Digital signature
7. HMAC
8. SSL/TLS protocols
• Define cryptography.
• Plaintext vs. ciphertext.
• Need of cryptography.
• Brute-force attack.
• Transposition technique.
• Types of cryptography.
• Digital certificate.
• X.509.
• AES (expand).
• DES (define).
• Key distribution.
• Integrity.
• Message authentication.
• Tunneling.
• Cross certification.
• PGP services.
• Kerberos details.
• Firewall architecture.