Categories
Important question

CS6701 Important Questions Cryptography and Network Security Regulation 2013 Anna University

CS6701 Important Questions Cryptography and Network Security

CS6701 Important Questions Cryptography and Network Security Regulation 2013 Anna University free download. Cryptography and Network Security CS6701 Important Questions pdf free download.

Sample CS6701 Important Questions Cryptography and Network Security:

1. Distinguish between passive attack and active attack with reference to X.800. (A/M-11)
X.800 categorize the attacks into two, namely passive and active attacks.
Passive attacks: Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. It includes release of message contents and Traffic analysis. Passive attacks are very difficult to detect because they do not involve any alteration of data. However, it is feasible to prevent the success of these attacks, usually by means of encryption.
Active attacks: Active attack involves some modification of the data stream or the creation of a false data stream and can be subdivided into four categories namely as a masquerade, replay, modification of messages and the denial of service attack.

2. Define –Key and Plaintext (M/J-09) CS6701 Important Questions Cryptography and Network Security
In cryptography, a key is defined as a piece of information that determines the functional output of a cryptographic algorithm or cipher. In encryption, a key specifies the particular transformation of plaintext into ciphertext or vice versa during decryption. Plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.

3. Find the GCD of 2740 and 1760, using Euclidean algorithm. (N/D-08) CS6701 Important Questions Cryptography and Network Security
The GCD of two numbers say a and b can be found using the following formula
gcd(a,b) =gcd(b,a mod b)
GCD(2740,1760) = gcd(1760, 2740 mod 1760)= gcd(1760,980)=980

4. What is encipherment? (A/M-12) CS6701 Important Questions Cryptography and Network Security
The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.

5. What is a passive attack? (M/J-09) CS6701 Important Questions Cryptography and Network Security
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.

 

Subject Name Cryptography and Network Security
Subject code CS6701
Regulation 2013

CS6701 Important Questions Cryptography and Network Security click here to download 

CS6701 Important 16 marks Questions Cryptography and Network Security


CS6701 Syllabus Cryptography and Network Security


CS6701 Notes Cryptography and Network Security


CS6701 Question Bank Cryptography and Network Security


 

 

Leave a Reply

Your email address will not be published. Required fields are marked *