0% found this document useful (0 votes)
10 views

Scheme

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Scheme

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Exam Slot: E

06EC6152 Reg Number. . . . . . . . .


Name. . . . . . . . . . . . . . .

A P J ABDUL KALAM TECHNOLOGICAL UNIVERSITY


M.TECH DEGREE EXAMINATION, MAY/JUNE 2019
SECOND SEMESTER
Communication Engineering
Principles of Secure Communication
Scheme & Answer Key

Time: 3 Hrs Maximum Marks:60

PART A
Answer ALL Questions

1. a)Define Euler’s totient function or phi function and determine Euler’s Totient
function of (231).
b) Determine gcd(4655,12075)
Scheme & Answer Key:Definition: 1 marks, Finding Eulers Totient function 2
marks Finding GCD 2 marks

2. a) What are polyalphabetic ciphers? Give examples.


b)Employ RAILFENCE cipher method to encrypt the message:“A P J ABDUL
KALAM TECHNOLOGICAL UNIVERSITY”;ignore spaces
Scheme & Answer Key:Explanation: 2 marks examples :1 mark Finding RAIL-
FENCE cipher 2 marks

3. What are the requirements of hash function ?Differentiate between MAC and
Hash function.
Scheme & Answer Key:Explanation: 2 marks differentiation 3 marks

4. What are viruses? What are the different types of viruses? What are the pre-
cautions to be taken against virus?
Scheme & Answer Key:Explanation: 2 marks Types:1 mark differentiation 3
marks
4 x 5 marks = 20 marks

PART B

5. a) What is a ring? List its properties. When does a ring become a field?
b)State Fermat’s theorem. Using Fermat’s theorem, find 3201 mod 11
Scheme & Answer Key:a)Explanation: 1 mark properties: 2 marks Explanation:
2 marks b)statement:2 marks solution:3 marks

OR

1
6. a) State and explain the importance of Chinese Remainder theorem in Cryptog-
raphy
b)(ii) Using CRT,find x from the equations, x ≡ 88 mod 6 and x ≡ 100 mod 15
Scheme & Answer Key:a)Explanation: 5 marks b)solution: 5 marks

7. a)Use Playfair cipher to encrypt the message “We live in an insecure world ”with
secret key “GUIDANCE”. Decrypt the Playfair code“SYICHOLER ”using the
keyword alphabet.
b)Write about Mix-Columns Transformation and Add-Round Key Transforma-
tion of AES cipher.
Scheme & Answer Key:a) solution:5 marks b)Explanation: 5 marks

OR

8. What is the purpose of the S-boxes in DES? Draw the general structure of DES
and explain the encryption and decryption process.
Scheme & Answer Key:Explanation: 5 marks Diagram:5 marks

9. Discuss RSA with computations for public key cryptography. Also perform the
Encryption and decryption for p =7 , q = 11, e = 17 and m = 8.
Scheme & Answer Key: discussion: 6 marks solution: 4 marks

OR

10. What are the basic mechanisms involved in digital signatures?List the properties
of digital signature scheme. Explain the two approaches to digital signature.
Scheme & Answer Key:Explanation: 10 marks

11. a)Using elliptic curve cryptography, explain how secret keys are exchanged and
messages are encrypted.
b)Users A and B use Diffie-Hellman key exchange scheme using prime q=71 and
primitive root α =2.
i)User A has private key Xa=5, What is the public key of A: Ya?
ii)User B has private key Xb=12, what is the public key of B: Yb?
iii)What is the shared secret key?
Scheme & Answer Key:a) Explanation: 5 marks b)solution 2+2+1 marks

OR

12. What is a firewall? What is the need for firewalls? Describe different techniques
used by firewalls to control access and enforce a security policy.
Scheme & Answer Key:Explanation: 10 marks
4 x 10 marks = 40 marks

You might also like