University
(|TER), Siksha 0'Anusandhan Deemedtobe
Facultv of Engineering and Technology
MID-SEMESTER EXAMINATION, April-2023
3035)
Cryptography & Network Security (CSE
Semester:6th
Programme: B.Tech/BCA Time: 2 Hours
Full Marks: 30
Marks
*Taxonomy Ques.
Subject/Course Learning Level Nos.
Outcome
Able to understand the L1 1(c)
L2 1(a)(b),2(a)
security requirement, diferent
and
type of security threat
attack and the principles of
security design. 2(b),4(c) 18
to understand and L1
Able L2 S(a)
implement the most common L3 2{c),3(a)(b),4(b)
of cryptographic 4(a), S(b)
type LA
algorithm. 3(c),5(c) 4
L3
Able to apply modern algebra
and number theory for
understanding of
cryptographic algorithms and
vulnerabilities
Remembering (LI), Understanding (L2),
levels:
*Bloom's taxonomy
Evaluation (L5), Creation (L6)
Application (L3), Analysis (A),
question carries equal mark.
Answer all questions. Each
triad related to computer
2
the significance of ClA
1. (a) Briefly explain
security. context of cryptographic 2
What is meant by "active attack in the
(b) types of active attacks.
system. Also name ditferent 2
the two terms cryptography and cryptanalysis.
(c Diferentiate
2
the "chosen plaintext" type attack.
2. ( Explain briely
difference between substitution and transposition type 2
fbt State the examples.
encryption techniques with
page 1 of 4
e Formulate çaeser cipher for the cipher Text: HHWPHDIWHU 2
WKH WRJD SDUWB to jdentify the plain text with the default
key K=3.
3. (a) What will be the plain text if the cipher text is given by 2
"SOAUNIVERSITY" using playfair cipher with keyword as
"SECRET" (assuming jis combined with i)? Use X' as fller.
(b) Determine the corresponding ciphertext for the plaintext 2
("hill" using the key matrix
k=
2 2
Determine the inverse mod 26 of the matrix.
2
4. (a) Consider the Ciphertext «ICUEEPSWSMNLDHLIAEOE". Using
the Rail Fence Cipher,find out the plaintext for key value 2.
2
{D Using the VIGENERE cipher, encrypt the word "encryption"
using the keyword leg":
2
State the advantages ar1d disadvantages of Steganography".
Briefly explain the design parameters to realize a Feistel cipher
2
5) (a)
structure.
table as gven 2
(b) Givena 8-bit input (35)H to a permutation
permutation
Find the 8-bit output after (in
below.
hexadecimal).
5 173
6 2 8| 4
2
(c) Using Eucidean algorithm find the GCD for the followings:
(i) (2740, 1760)
(i) (4655, 12075);
*End of Questions*
Page 2 of 4