0% found this document useful (0 votes)
63 views8 pages

NSP-PQP (Not Exact Syllabus)

The document discusses cryptography and network security topics for a university exam. It contains questions about cryptographic algorithms, protocols, and concepts like AES, RSA, digital signatures, and IPsec.

Uploaded by

ASHNA A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views8 pages

NSP-PQP (Not Exact Syllabus)

The document discusses cryptography and network security topics for a university exam. It contains questions about cryptographic algorithms, protocols, and concepts like AES, RSA, digital signatures, and IPsec.

Uploaded by

ASHNA A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Scanned with CamScanner

Scanned with CamScanner


E G7907 Pages: 2

Reg No.:_______________ Name:__________________________

APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY


SEVENTH SEMESTER B.TECH DEGREE EXAMINATION, DECEMBER 2018
Course Code: CS409
Course Name: CRYPTOGRAPHY AND NETWORK SECURITY
Max. Marks: 100 Duration: 3 Hours

PART A
Answer all questions, each carries 4 marks. Marks

1 Differentiate between computationally secure cipher and unconditionally secure (4)


cipher. Write examples with reasoning.
2 Encrypt the message “this is an exercise” using the additive Cipher with key=20 (4)
3 What is the necessity of block cipher modes of operation? List out the (4)
advantages and disadvantages of output feedback mode.
4 Generate the key attributes for the values p = 11 and q = 3. Also encrypt the (4)
message m = 2 with the generated keys.
5 Find gcd (1970, 1066) (4)
6 Discuss digital signature scheme using RSA (4)
7 Write the general structure of Private Key Ring used in Pretty Good Privacy (4)
(PGP).
8 What are the functionalities provided by Secure MIME (S/MIME)? (4)
9 What is the significance of Alert Protocol in Transport Layer Security? (4)
10 Why the attacker is not able to recognize the actual sender of the message in (4)
encrypted tunnels?

PART B
Answer any two full questions, each carries 9 marks.

11 a) Use Playfair Cipher with key COMPUTER to encrypt the message (5)
“CRYPTOGRAPHY”.
b) How key generation is done in DES. (4)
12 a) Discuss the stream cipher RC4 in detail (4)
b) Illustrate the round transformation of IDEA. (5)
13 a) Encrypt the text “LOVE” using Hill Cipher with the key 9 4 (4)
5 7
b) Illustrate S box creation in AES (5)

Page 1of 2
E G7907 Pages: 2

PART C
Answer any two full questions,each carries 9 marks.

14 a) Define Euler’s Totient Function. Prove that, ɸ(pq) = (p-1)(q-1), where p and q (5)
are prime numbers.
b) Demonstrate Diffie Hellman Key exchange algorithm. (4)
15 Illustrate the working of SHA-1 with diagrams. (9)
16 a) What are the Security Requirements of message authentication? (4)
b) Give the encryption/decryption procedures using Elliptic Curve Cryptography. (5)

PART D
Answer any two full questions, each carries 12 marks.

17 a) Explain the sequence of steps involved in the message generation and reception (8)
in Pretty Good Privacy (PGP) with block diagrams.
b) List out the security association (SA) parameters in IPSec. (4)
18 a) Illustrate the working of Secure Electronic Transaction (SET) in detail. (8)
b) Compare Packet filter and Application Level Gateways. (4)
19 a) Explain the method of protecting IP datagram from replay attack using IPsec. (6)
b) Explain the sequence of steps used in Secure Socket Layer handshake Protocol (6)
for establishing a new session. Draw a diagram which shows the action of
Handshake Protocol.
****

Page 2of 2
E G1102 Pages: 2

Reg No.:_______________ Name:__________________________


APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
SEVENTH SEMESTER B.TECH DEGREE EXAMINATION(S), MAY 2019
Course Code: CS409
Course Name: CRYPTOGRAPHY AND NETWORK SECURITY
Max. Marks: 100 Duration: 3 Hours

PART A
Answer all questions, each carries 4 marks. Marks

1 How the nonlinearity is achieved in DES. (4)


2 Differentiate Confusion and Diffusion. (4)
3 Discuss the key expansion procedure in AES (4)
4 State and prove Fermat’s Theorem (4)
5 In a public key system using RSA, you intercept the cipher text C=8 sent to a user (4)
whose public key is e=13, n=33. What is the plain text M?
6 Compare the strength of MAC and Encryption against brute-force attack (4)
7 Give the header format of ESP in IPSec (4)
8 Give the authentication methods used in Oakley algorithm (4)
9 What are the services provided by Record Layer Protocol for Secure Socket (4)
Layer connections?
10 What are the characteristic features of stateful inspection firewall? (4)
PART B
Answer any two full questions, each carries 9 marks.
11 a) Differentiate between monoalphabetic ciphers and polyalphabetic ciphers (5)
and give one example for each.
b) Give different techniques used in steganography (4)
12 a) How key generation is performed in IDEA (4)
b) Discuss Mix Column transformation in AES (5)
13 a) Using rail fence cipher, encrypt the text meet me after the toga party using the (4)
key 4 3 1 2 5 6 7.
b) Illustrate inverse S box creation in AES. (5)
PART C
Answer any two full questions, each carries 9 marks.
14 a) Find gcd(240, 46) using Extended Euclid’s Algorithm (4)
b) Discuss the key exchange procedure using Elliptic Curves. (5)

Page 1of 2
E G1102 Pages: 2

15 Illustrate MD 5 hash algorithm in detail (9)


16 a) Consider a Diffie Hellman scheme with a common prime q = 11 and primitive (5)
root α = 2.
i. Show that 2 is a primitive root of 11.
ii. If user A has public key YA = 9, what is A’s private key?
iii. If user B has public key YB = 3, what is the shared secret key K,
shared with A
b) Discuss Digital Signature Algorithm (4)
PART D
Answer any two full questions, each carries 12 marks.
17 a) What are the steps used for preparing an enveloped data and signed data in (6)
MIME entity?
b) Discuss the message format of PGP. (3)
c) How the integrity is achieved using ICV in Authentication Header. (3)
18 a) Illustrate the relevance of dual signature in SET. (4)
b) Discuss SSL record protocol operations. (6)
c) What are the requirements of Encrypted Tunnels? (2)
19 a) Give the significance of SA selectors in IPSec. (4)
b) Why compression is done before encryption in PGP? (2)
c) Discuss different Firewall configurations. (6)
****

Page 2of 2

You might also like