Cryptography hand written Notes
CS8792 CNS CRYPTOGRAPHY AND NETWORK SECURITY 1 Differentiate active attacks and passive attacks. 2 Define Steganography. 3 Quote Euler’s theorem. 4 Define cryptanalysis. 5 Compare Substitution and Transposition techniques. 6 Analyse why Random numbers are used in Network Security. 7 List the four categories of security threats. 8 Calculate GCD of 1070 and 1066 using Euclid algorithm. 9 Define primitive root. 10 Give examples for substitution cipher. 11 Define cryptography 12 Explain why Modular arithmetic has been used in cryptography. 13 Compare Block cipher and Stream cipher. 14 Classify the basic functions used in encryption algorithms. 15 Describe security mechanism. 16 Assess the following cipher text using brute force attack: CMTMROOEOORW 17 Generalize why network need security. 18 Give examples for transposition cipher. 19 Show how to convert the given text “VALLIAMMAI” into cipher text using Rail fence Technique. 20 Plan how many keys are required by two people to communicate via a cipher.
Content preview
Written for
- Course
- Cryptography hand written Notes
Document information
- Uploaded on
- January 10, 2023
- Number of pages
- 10
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cryptography notes
-
cryptography
-
cryptography hand written notes