0% found this document useful (0 votes)
57 views1 page

Instructions:: Gujarat Technological University

1. This document is an exam for a course on information security. It contains 5 questions testing knowledge of topics like encryption algorithms, digital signatures, key exchange, and network security protocols. 2. The questions cover symmetric and asymmetric encryption algorithms like Playfair cipher, DES, RSA, Diffie-Hellman, and algorithms for key distribution and digital signatures. 3. Network security protocols examined include SSL/TLS, Kerberos, X.509, and PGP. Students are required to explain algorithms, attacks, parameters, and overall functionality.

Uploaded by

Shweta Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views1 page

Instructions:: Gujarat Technological University

1. This document is an exam for a course on information security. It contains 5 questions testing knowledge of topics like encryption algorithms, digital signatures, key exchange, and network security protocols. 2. The questions cover symmetric and asymmetric encryption algorithms like Playfair cipher, DES, RSA, Diffie-Hellman, and algorithms for key distribution and digital signatures. 3. Network security protocols examined include SSL/TLS, Kerberos, X.509, and PGP. Students are required to explain algorithms, attacks, parameters, and overall functionality.

Uploaded by

Shweta Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Seat No.: _____ Enrolment No.

______
GUJARAT TECHNOLOGICAL UNIVERSITY
BE- VIth SEMESTER–EXAMINATION – MAY- 2012
Subject code: 160702 Date: 11/05/2012
Subject Name: Information security
Time: 10:30 am – 01:00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

Q.1 (a) 1. Construct a Playfair matrix with the key “engineering”. And 04
encrypt the message “test this process”.
2. The exact realization of Feistel network depends on the 03
choice of which parameters?
(b) What is the objective of attacking an encryption system? Write the 07
two approaches to attack a conventional encryption scheme.

Q.2 (a) Write four possible approaches to attacking the RSA algorithm. 07
(b) Explain the key distribution scenario and write how does 07
decentralized key control work?
OR
(b) Explain Blowfish encryption algorithm. 07

Q.3 (a) 1. Explain the triple DES scheme with two keys and write about 04
proposed attacks on 3DES.
2. What is a dual signature in reference to secure electronic 03
transaction?
(b) Write and explain the Diffie-Hellman key exchange algorithm. 07
OR
Q.3 (a) 1. Write the key features of secure electronic transaction. 04
2. Explain the one time pad scheme. 03
(b) List and explain four general categories of schemes for the 07
distribution of public keys.

Q.4 (a) 1. What is an elliptic curve? What is the zero point of an elliptic 04
curve?
2. Define the Caesar cipher. 03
(b) Explain the general format of PGP(Pretty Good Privacy) message. 07
Assume that message is going from A to B.
OR
Q.4 (a) 1. Explain Euler’s totient function. 04
2. What is the difference between transport mode and tunnel 03
mode?
(b) Illustrate the overall operation of HMAC. Define the terms. 07

Q.5 (a) Which parameters define session state and which parameters define 07
connection state in SSL(secure socket Layer)?
(b) Explain the one –way and two way authentication in X.509. 07
OR
Q.5 (a) Explain the ticket granting server(TGS) scheme in Kerberos. 07
(b) Explain the DES encryption algorithm. 07
*************

You might also like