Code: 15A05702 R15
B.Tech IV Year I Semester (R15) Regular Examinations November/December 2018
INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) What is the difference between a block cipher and a stream cipher?
(b) What do you mean by steganography?
(c) What is modulus operator and what is its application?
(d) What are the principal elements of a public-key cryptosystem?
(e) What is the role of a compression function in a hash function?
(f) List the three approaches to message authentication.
(g) What are the two different uses of public-key cryptography related to key distribution?
(h) In the context of Kerberos, what is a realm?
(i) Give examples of applications of IPSCC.
(j) Write the design goals for a firewall.
PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 Define computer security. List and explain the challenges of computer security.
OR
3 Explain the concepts of differential and linear cryptanalysis.
UNIT – II
4 Define and explain Chinese remainder theorem.
OR
5 Describe RSA algorithm with an example.
UNIT – III
6 Explain the basic arithmetical and logical functions used in SHA.
OR
7 Describe the digital signature algorithm.
UNIT – IV
8 Write notes on X.509 certificate.
OR
9 Explain about Pretty good privacy method for electronic mail security.
UNIT – V
10 Describe SSL architecture.
OR
11 Explain the working principle of HIDPS.
*****
Code: 15A05702 R15
B.Tech IV Year I Semester (R15) Supplementary Examinations June/July 2019
INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) What is the difference between passive and active security threats?
(b) Why is the middle portion of 3DES a decryption rather than an encryption?
(c) Define linear congruence.
(d) What do you mean by elliptic curve cryptography?
(e) What characteristics are needed in a secure hash function?
(f) List two disputes that can arise in the context of message authentication.
(g) How is an X.509 certificate revoked?
(h) What problem was Kerberos designed to address?
(i) List the services provided by IPSee.
(j) What metrics are useful for profile-based intrusion defection?
PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 List and explain categories of security services and security mechanisms.
OR
3 Describe advanced encryption standard (AES) with neat sketch.
UNIT – II
4 Explain the difference between modular arithmetic and ordinary arithmetic with an example.
OR
5 Discuss Diffie-Hellman key exchange algorithm.
UNIT – III
6 Explain how secure hash function is an alternative to MAC.
OR
7 Describe the DSS approach with the help of neat sketch.
UNIT – IV
8 Explain the procedure of key distribution in conventional encryption algorithms.
OR
9 Justify why S/MIME is a security enhancement to MIME internet e-mail format standard.
UNIT – V
10 List and explain SSH protocols.
OR
11 Discuss packet filtering router with merits and demerits.
*****
Code: 15A05702 R15
B.Tech III Year II Semester (R15) Supplementary Examinations December 2019
INFORMATION SECURITY
(Information Technology)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) How is meet in the middle attack done in 2-DES?
(b) Using hill cipher to encipher the message “we live in a insecure world”. Use the key:
(i) 03 02.
(ii) 05 07.
(c) Differentiate conventional and public key encryption.
(d) Solve the congruence x5 = 11 mod 17.
(e) What are the attacks that are possible on RSA?
(f) What are the properties that a digital signature should have?
(g) Compare worms and viruses.
(h) Mention the purpose of internet key exchange.
(i) What are the contents of a security association?
(j) Differentiate between tunnel mode and transport mode of IPSec.
PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 What are block ciphers? Explain how diffusion and confusion are used in block ciphers. Explain
about the Fiestel structure.
OR
3 Explain about the encryption and decryption using triple DES. Evaluate its strength with DES.
UNIT – II
4 Use Euler’s theorem to find a number X between 0 and 28 with X83 congruent to 6 modulo 35 (You
should not need to use any brute force searching).
OR
5 The public key crypto system addresses certain problems of symmetric crypto systems. What are
those problems explain in detail.
UNIT – III
6 Using RSA algorithm, find n, d if p = 11, q = 3, e = 3. Encrypt “Hello world” message.
OR
7 With a neat diagram, explain the steps involved in SHA algorithm for encrypting a message with
maximum length of less than 2128 bits and produces as output a 512 bit message digest.
UNIT – IV
8 Describe the SSL specific protocol – handshake action in detail.
OR
9 What are the environmental shortcomings of Kerberos 4? How does Kerberos 5 address them?
UNIT – V
10 Draw the IP security authentication header and describe the functions of each field.
OR
11 What is meant by transport mode and tunnel mode? How is authentication header implemented in
these two modes?
*****
Code: 15A05702 R15
B.Tech IV Year I Semester (R15) Supplementary Examinations October 2020
INFORMATION SECURITY
(Computer Science & Engineering)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) Define security mechanism and security service.
(b) What are the two requirements for secure use of conventional encryption?
(c) Explain about divisibility.
(d) Define a residue class and a least residue.
(e) What is the difference between weak and strong collision resistance?
(f) What is the role of a compression function in a hash function?
(g) What is the difference between a session key and a master key?
(h) What are two different uses of public-key cryptography related to key distribution?
(i) What is the difference between an SSL connection and an SSL session?
(j) What is the purpose of HTTPS?
PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 (a) Explain the challenges of computer security.
(b) Consider a desktop publishing system used to produce documents for various organizations.
(i) Give an example of a type of publication for which confidentiality of the stored data is the most
important requirement.
(ii) Give an example of a type of publication in which data integrity is the most important
requirement.
(iii) Give an example in which system availability is the most important requirement.
OR
3 (a) List and briefly define categories of security services.
(b) Explain the difference between a monoalphabetic cipher and a polyalphabetic cipher.
UNIT – II
4 Explain Diffie-Hellman key exchange in detail with an example.
OR
5 (a) Explain the principles of public key cryptography.
(b) Explain about Elliptic Curve Cryptography.
UNIT – III
6 (a) Explain the applications of cryptographic hash functions.
(b) State the value of the padding field in SHA-512 if the length of the message is:
(i) 1919 bits. (ii) 1920 bits. (iii) 1921 bits.
OR
7 (a) Explain the Message Authentication requirements
(b) DSA specifies that if the signature generation process results in a value of S = 0, a new value of k
should be generated and the signature should be recalculated. Why?
Contd. in page 2
Page 1 of 2
Code: 15A05702
R15
UNIT – IV
8 (a) What are the core components of a PKI? Briefly describe each component.
(b) In Kerberos, when Alice receives a reply, how does she know it came from Bob (that it’s not a replay
of an earlier message from Bob)?
OR
9 (a) Explain the problems with key management and how they affect symmetric cryptography.
(b) Explain about Client/Server authentication exchange in Kerberos Version 4.
UNIT – V
10 (a) What purpose does the MAC serve during the change cipher spec SSL exchange?
(b) What is the difference between a packet filtering firewall and a stateful inspection firewall? Explain
in detail.
OR
11 (a) Based on what you have learned, is it possible in SSL for the receiver to reorder SSL record blocks
that arrive out of order? If so, explain how it can be done. If not, why not?
(b) Explain about the digital immune system.
*****
Page 2 of 2