CS409 Cryptography and Network Security, December 2018 PDF
CS409 Cryptography and Network Security, December 2018 PDF
E G7907 W#713
RegNo.:
{flr-rffisV&t
APJ ABDTJL KALAM TECHNOLOGICAL UNIVERSITY
SEVENTH SEMESTER B.TECH DEGREE EXAMINATION. DECEMBER 2018
Course Code: CS409
Course Name: CRYPTOGRAPIIY AND IYETWORK SECIIRITY
Max. Marks: 100 Duratlon: 3 Hours
PART A
Answer all questions, each carries 4 marks. Marks
What is the necessity of block cipher modes of operation? List out the (4)
4 Generate the key attributes for the values p : 11 and q: 3. Also encrypt the (4)
Write the general structure of Private Key Ring used in Pretty Good Privacy (4)
(PGP).
l0 Why the attacker is not able to recognize the actual sender of the message in (4)
encrypted tunnels?
PART B
Answer any twofull questions, each carries 9 marks.
11 a) Use Playfair Cipher with key COMPUTER to encrypt the message (5)
..CRYPTOGRAPI{Y''.
Page 1of2
G7907 Pages:2
'''..,;
14.'.a) Define Euler's Totient Function. prove that, Q(pq) - (p-lXq-l), where p and q (5)
are prime numbers.
PART I)
Answer any twofull questians, each carries 12 marks.
17 a) Explain tle sequence of steps involved in the message generation and reception (S)
in Pretty Good Privacy (PGp) with block diagrams.
b) List out the security association (sA) parameters in IpSec. (4)
l8 a) Illustrate the working of Secure Electronic Transact'on (sET) in detail. (s)
b) Compare Packet filter and Application Level Gateways. (4)
T9 a) Explain the method^ of protecting IP datagrarn from replay attack using Ipsec. (6)
b) Explain the sequence of steps used in Secure Socket Layer handsirake protocol (6)
for establishing a new session. Draw a diagram which shows the'action of
Handshake Protocol.
****
Page2of2