0% found this document useful (0 votes)
63 views3 pages

Css-Ise - Question Paper

This document is an exam for a Cryptography and System Security course. It contains 10 multiple choice questions assessing various cryptography concepts like security goals, threats, algorithms and their properties. There are also two 5 mark questions - one asking to discuss DES algorithm analysis and the other asking to illustrate sending a video file securely using DES. The last question has two parts, one calculating a multiplicative inverse using the extended Euclidean algorithm and the other proving properties of a Feistel network diagram.

Uploaded by

d.soni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views3 pages

Css-Ise - Question Paper

This document is an exam for a Cryptography and System Security course. It contains 10 multiple choice questions assessing various cryptography concepts like security goals, threats, algorithms and their properties. There are also two 5 mark questions - one asking to discuss DES algorithm analysis and the other asking to illustrate sending a video file securely using DES. The last question has two parts, one calculating a multiplicative inverse using the extended Euclidean algorithm and the other proving properties of a Feistel network diagram.

Uploaded by

d.soni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

K. J.

Somaiya College of Engineering, Mumbai-77


(Autonomous College Affiliated to University of Mumbai)
Semester: January – May 2021
In-Semester Examination

Class: TY B. Tech
Branch: Comp. Engg. Semester : VI
Full name of the course: Cryptography and System Security Course Code: 2UCC602
Duration: 1hr.15 min (attempting questions) +15 min (uploading) Max. Marks: 30

Q. Questions Marks
No
Q1 1.1 A security ___________ makes use of one or more security
___________

a. Service, Mechanisms
b.Goal, mechanisms
c. Mechanism, services
d.Mechanism, goals

1.2 A student steals test question paper from a professor’s office. It is


an attack on which of the following
a. Confidentiality
b. Integrity
c. Availability
d. Authentication

1.3 An attacker modifies the transaction amount in banking system. It


is an attack on which of the following 10 marks
a. Confidentiality (1 MARK
b. Integrity EACH)
c. Availability
d. Authentication

1.4 State whether the following is true or false


Masquerade is a passive threat.

1.5 Confusion is hiding the relationship between _______ and


_________

1.6 Diffusion is hiding the relationship between ______ and ________

1.7 In DES algorithm the block size = ____ and key size = _____
1.8 In AES algorithm the block size = _____ and key size = ______
(all variants)

1.9 In DES algorithm, what is the probability of randomly selecting a


weak, a semi-weak, or a possible weak key?

1.10 Name the modes of operation of block ciphers which allow a


block cipher to be used as stream cipher

Q2 Discuss various methods of defense giving at least one example for 10 marks
each method.

OR

A) Discuss DES algorithm analysis with respect to its strengths and 5 marks
weaknesses.

B) You have video file with size 100 MB, Illustrate how will you send
it securely using DES algorithm. 5 marks

Q3 A) Find the multiplicative inverse of 13 in Z100 using extended


05 marks
Euclidean method.

B) With respect to below figure, prove that


05 marks
L6 = L1 and R6 = R1
Figure for Q3B

You might also like