We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
Reg. No.: (eal l
Question Paper Code : 40917
B.E/B.Tech. DEGREE EXAMINATION, APRIL/MAY 2018
Seventh/Eighth Semester
Computer Science and Engineering
CS6701 - CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Electronics and Communication Engineering/Information Technology)
(Regulations 2013)
Time : Three Hours Maximum : 100 Marks
Answer ALL questions
PART~A (10x2=20 Marks)
1. Why is asymmetric cryptography bad for huge data ? Specify the reason.
. State Euler's theorem.
en
. List the parameters (block size, key size, and no. of rounds) for the three AES
versions.
5
Perform encryption and decryption using RSA Algorithm for the following. P = 7;
q=1l,e=17;M=8,
What is a hash in cryptography ?
How digital signatures differs from authentication protocols ?
What is the main function of a firewall ?
. What is a Threat ? List their types.
. List out the services provided by PGP.
10. What is the difference between TLS and SSL security ?
fe eprnas
PART-B (5*16=80 Marks)
11. a) Explain classical encryption techniques with symmetric cipher and Hill cipher
model.
(OR)
'b) State and prove the Chinese remainder theorem. What are the last two digits
of 4919240917 CON 0
12. a) What do you mean by AES ? Diagrammatically illustrate the structure of AES.
and describe the steps in AES encryption process with example.
(OR)
b) With a neat sketch explain the Elliptic curve cryptography with an example.
18. a) How Hash function algorithm is designed ? Explain their features and
properties.
(OR)
b) With a neat diagram, explain the MDS processing of a single 512 bit block.
14. a) Explain briefly about the architecture and certification mechanisms in Kerberos
and X.509.
(OR)
b) How does screened host architecture for firewalls differ from screened subnet
firewall architecture ? Which offers more security for information assets on
trusted network ? Explain with neat sketch.
15, a) lustrate how PGP encryption is implemented through a suitable diagram.
(OR)
b) Write short notes on the following :
a) Public Key Infrastructure (8)
b) Secure Electronic Transaction ®