0% found this document useful (0 votes)
180 views2 pages

CS409 Cryptography and Network Security, December 2018 PDF

This document contains questions related to cryptography and network security topics. It has questions in multiple choice, fill in the blanks, short answer and long answer formats across four parts - Part A with 10 questions of 4 marks each, Part B with 3 questions of 9 marks each, Part C with 3 questions of 9 marks each and Part D with 2 questions of 12 marks each. The questions cover topics like ciphers, encryption algorithms, digital signatures, key exchange, hashing, authentication and network security protocols.

Uploaded by

Reshma Sindhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
180 views2 pages

CS409 Cryptography and Network Security, December 2018 PDF

This document contains questions related to cryptography and network security topics. It has questions in multiple choice, fill in the blanks, short answer and long answer formats across four parts - Part A with 10 questions of 4 marks each, Part B with 3 questions of 9 marks each, Part C with 3 questions of 9 marks each and Part D with 2 questions of 12 marks each. The questions cover topics like ciphers, encryption algorithms, digital signatures, key exchange, hashing, authentication and network security protocols.

Uploaded by

Reshma Sindhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

,/-% \d\e

E G7907 W#713
RegNo.:
{flr-rffisV&t
APJ ABDTJL KALAM TECHNOLOGICAL UNIVERSITY
SEVENTH SEMESTER B.TECH DEGREE EXAMINATION. DECEMBER 2018
Course Code: CS409
Course Name: CRYPTOGRAPIIY AND IYETWORK SECIIRITY
Max. Marks: 100 Duratlon: 3 Hours

PART A
Answer all questions, each carries 4 marks. Marks

Differentiate between computationally secure cipher and unconditionally secure (4)

cipher. Write examples with reasoning.


Encrypt the message "this is an exercise" using the additive Cipher with ke520 (4)

What is the necessity of block cipher modes of operation? List out the (4)

advantages and disadvantages of outputfeedback mode.

4 Generate the key attributes for the values p : 11 and q: 3. Also encrypt the (4)

message m:2 with the generated keys.


5 Find gcd (1970,1066) (4)

6 Discuss digital signature scheme using RSA (4)

Write the general structure of Private Key Ring used in Pretty Good Privacy (4)

(PGP).

8 What are the functionalities provided by Secure MIME (SA4IME)? (4)

9 What is the significance of Alert Protocol in Transport Layer Security? (4)

l0 Why the attacker is not able to recognize the actual sender of the message in (4)

encrypted tunnels?

PART B
Answer any twofull questions, each carries 9 marks.

11 a) Use Playfair Cipher with key COMPUTER to encrypt the message (5)
..CRYPTOGRAPI{Y''.

b) How key generation is done in DES. (4)

12 a) Discuss the stream cipher RC4 in detail (4)

b) Illustrate the round transformation of IDEA. (s)


-1 3--a) * EnaffiTetext TovE-
b) Illustrate S box creation in AES (5)

Page 1of2
G7907 Pages:2

'''..,;

. Answer any twofaA quesfionsreach carries 9 marks.

14.'.a) Define Euler's Totient Function. prove that, Q(pq) - (p-lXq-l), where p and q (5)
are prime numbers.

b) Demonstate Diffie Hellman Key exchange algorithm. (4)


15 Illustrate the working of SHA-I with diagrams. (e)
16 a) what are the SecurityRequirements ofmessage authentication? (4)
b) Give the encryption/decryption procedures using Ellipic Curve Cryptography. (s)

PART I)
Answer any twofull questians, each carries 12 marks.

17 a) Explain tle sequence of steps involved in the message generation and reception (S)
in Pretty Good Privacy (PGp) with block diagrams.
b) List out the security association (sA) parameters in IpSec. (4)
l8 a) Illustrate the working of Secure Electronic Transact'on (sET) in detail. (s)
b) Compare Packet filter and Application Level Gateways. (4)
T9 a) Explain the method^ of protecting IP datagrarn from replay attack using Ipsec. (6)
b) Explain the sequence of steps used in Secure Socket Layer handsirake protocol (6)
for establishing a new session. Draw a diagram which shows the'action of
Handshake Protocol.
****

Page2of2

You might also like