0% found this document useful (0 votes)
62 views12 pages

Crypto - QP

Uploaded by

Krupa Janani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views12 pages

Crypto - QP

Uploaded by

Krupa Janani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Departmentof In formationTechnology

Chromnepet, Chennai - 600 044.


Madras Institute of Technology,
SECURITY
ITS703CRYPTOGRAPHY AND
Regulation 2019

Maximum Marks:50
Assessmnent TestI
7/8 B.Tech -IT Time :90 minutes
Date: 19/09/2023

CourseOutcomes:

basic security algorithms and policies required for a computing system.


design security
1.Apply the computing system and hence be able to
across any
2. Predict the vulnerabilities
solution for any computing system. issues and resolve the issues.
3. To identify any network security security.
4. To manage the firewall and WLAN
vulnerabilities and mitigation.
5. Evaluate the system related real-time.
6. To design secured web applications in
Part-A (5x2=10 Marks)
CO
Marks Level
Questions
Q.No 1
with Ceaser and affine ciphers if the character 2
How many keys can be used
set used is [a-z, A-Z]? Give reasons.
1 1
2
mod 13.
2 State Fermat'stheorem and Compute 6 2
2
3 Distinguish passive and active attacks.
word University" using the keyword 2
Use Vignere cipher to encrypt the
4 "Madras" 1
2
satisfied by a ring.
5 Define ring and list the axioms

Part-B (2x13=26 Marks) CO


Marks
Questions LEVEL
Q.No
a) i. Summarize RSA Cryptosystem. In a public key cryptosystem usingis 1
intercept the ciphertext C-30 sent to Bob whose public key 7
RSA, Eve
(e-5, n=35). What is plaintext M?
1
multiplicative inverse of 37 mod 3120 and gcd 6
a) ii). Find the
(32480,4805672)
6
OR

b)í.Given f(x) = (x'+x+x'+x'+ x+xUse + 1) and g(x) = (x'+x+x'+x t 5

Perform f(x) + g(x) and f(x) * g(x). m(x) =(x+xtx'+x +1)


1). encrypt the word mitceg"
b)ií. Explain Hill cipher in detail. Apply it to 8
Perform decryption also.
using the key (6 24 1;13 1610; 20 17 15].
Q.No
7

Sl=[0 S0 P4Encrytpion
Expansion IPSDES
IP Generation:
P8P10 Key the Let AES.necessary
diagrams.
b) b) a)Analyze a)i.
=[1=2 inverse =26 i. i. i.
=63 =3 ciphertext the Explain Describe Sketch Explain
4
032;32 3 3 5274
74 10 its
2 123;20 1 1 bit
-
= 4 the strength
12
0 permutation 4 85 how the the
using key
32 1385 109 10 structure
572 7 basic single
198 be keys
110; Simplified-DES.
1101011010. and
8)32 2 3;3 0
2 =86 6 are structure weaknesses.
of round
0 1 4 generated Triple
1 3; 12323
0; QuestionsPart-C and operation
2 13 The OR IDES
03] 132] 4 transformations
ciphertext for and
1 (1
x the of
14=14 different explain
need.its
Data
20l3 is
0110 Marks) involved Encryption
round
1001.
2laintet operations in
Decrypt AES Standard.
with
the of

Marks
14 4 9
9

2 2 2
2
2
Roll Nurmber:
DEPARTMENT OF INFORMATION TECHNOLOGY
ASSESSMENT1
Seventh Semester
IT5703 CRYPTOGRAPHY AND SECURITY
(Regulation 2019)
29th September 2022

Time: 1.5 Hours Max Marks:50

CO1 Apply the basic security algorithms and policies required for a computing systerm.
CO2 Predict the vulnerabilities across any computing system and hence be able to design
security solution for any computing system.
CO3 To identify any network security issues and rcsolve the issues.
CO4 To manage the firewall and WLAN security.
CO5 Evaluate the system related vulnerabilities and mitigation.
CO6 To design secured web applications in real-time.
BL -Bloom's Taxonomy Levels
(LI -Remembering, L2 -Understanding, L3- Applying, L4- Analysing, L5 - Evaluating, L6
- Creating)
PART A (5x2 = 10 marks)
(Answer all Questions)
1. Describe different types of attacks threatening the confidentiality of information. Marks:2,
CO:2, BL:L1]
2. List the criteria defined by NIST for AES. Marks:2, CO:2, BL:L1
3. Use the Playfair cipher to encipher the message The key is hidden under the door
pad" The secret key can be made by using the keyword "GUIDENCE".Marks:2,
CO:1, BL:L2]
4. Find the result of the following: (a) 456" mod 17 (b) 20- mod 403
Marks:2, CO:1,
BL:L2)
5. Find the result of 3202 mnod 461 using square and
multiply. Marks:2, CO:1, BL:L2
PART B(40 marks)
6.(a) (i) The plaintext letusmeetnow" and the corresponding ciphertext
are given. You know that the algorithm is a Hill cipher, but you"HBCDFNOPIKLB"
of the key. Find the key matrix. Marks:7, CO:1, BL:L3 don't know the size

(i) Find the integer that has a reminder of 3 when divided by 7


and 13, but is divisible
by 12. Marks:6, CO:1, BL:L3)

(OR)
T.(b) (() Let f(z) = z +a+g+22++1 and g(z) =g'++1 with an
irreducible polynomial
m(u) = z + a + ° +a+1. Perform f() + g(u) and f() *g() in GF(2). [Marks
:7,C0:1,BL:L3)
1
(1) Given a Ciphcrtext CRIWWZ. Its plaintext starts witlh TIA' Find the key and the
remaning plaintext characters using Afine cipher. [Marks:6 ,CO:1BL :3)

8.(a) () Explain the significance of Feistel Cipher in symmetric block cipher. Marks:7, CO2,
BL:L2)

(i) Describe any 3 block cipher modes of operation. (Marks:6, CO:2, BL:L2)
(OR)
Marks:7 CO:2,
9.(a)(1) Explain the general structure of Advanced Encryption Standard (AES).
BL:L1|

criteria and de
(ii) Explain any two wealkness of DES. Analyse DES based on the Design
sirable block cipher properties. Marks: 6, CO: 1, BL :3)

PART C(1x 14 = 14 marks)

10. Perform the Encryption using Simplified DES. Marks:14, CO:2, BL:L3
The
Let the plaintext be the string 0010 1000. Let the 10 bit key be 1100011110.
Permutation tables and Sboxes are given below:

Key Generation
P103 5274 10 1 986
P8-6 3 74 85 10 9

SDES Encryption
Initial Permutation (IP) =2 63 1 4 857
Inverse Permutation (IP-') =4 135 7286
Expansion Permutation (E/P)= 4 123 2341
P4 243 1

012 3 0 12 3
0 0 3 2] 1 2
SO =1 3 2 1 0 S1 = 1 2 0 1 3
2 0 2 1 3 2 01 0
3 1 3 2| 2 1 0 3|
-oOo
4 54

Departmcnt of Information Technology


Madras Institute of Technology, Chromepet, Chennai -600 044.
IT5703 CRYPTOGRAPUYAND SECURITY
Regulation 2015 24 -uy
Mo la
Course Outeomes 2/B
On completionof the course, the students will be able to:
1. Apply the basic security algorithms and policies required for a computing system.
2. Predict the vulnerabilities across any computing system and hence be able to design security
solution for any computing system.
3. To identify any network security issues and resolves the issues.
4. To manage the firewall and WLAN security. Public ky
5.Evaluate the system related vulnerabilities and mitigation. 2
6. To design securedweb applications in real-time. CA
7/8B.Tech -IT Assessment Test II Maximum Marks:50
Date :09/12/2022 Time : 90 minutes
Rr=(11 mod
Part-A (5x2-10 Marks)
Marks CO BL
Q.No Questions
Alice and Bob use the Diffie-Hellman key exchange technique CO3 2
1 with a common prime q=71 and a primitive root a-7. If Alice 2
selects her private key XA as S, What is A's Public key Ya?
Siate the three fold propertics of cryptographichash. CO3

How are quantum keys distributed? 2 CO4 2


3

Give the message format of PGP. 2 CO3 1


4

2 CO6 2
5 Compare public and private blockchains.

Part-B (2x13=26 Marks)


BL
Q.No Questions Marks
8CO
hash codes in
a.i)Compare Message Authentication codes and 7 CO3 2
ensuring authentication.
ii) User A and B agreed upon the common primes p =7, q=
6. 11. They selected their private keys as e= 17 and 13 CO3 co
3
respectively. Help user A to encrypt message m = 12 ensuring
6
confidentiality and forward to user B using RSA. Also
perform decryption at the receving end.
OR

b.i) Explain SHA-512 round function with appropriate 7 CO3 2


diagrams.
ii)Consider a prime field GF(19) with a primitive root value of
13. Alice chooses his private key as 5 and generates the key 6 CO3 3
random
pair. Bob sends the message 14 to Alice. He selects a
integer k as 6 to generate the ciphertext. Use EIGamal
Cryptosystem and slhow all the computations involved in
encrypion and deccrvption.

a i) Summarize Kerberos version 4 message exchanges and 6 2


COS
brief itsoperation with asuitable diagram.

i) Discuss the services provided by SSL protocols in detail. 7 C06 2

7
OR

b. i) What are public key certificates? State their need and 6 COS 2
sketch the message format.

ii) Discuss the working of SET with a neat diagram. CO6 2

Part-C(1 x14-14 Marks)


Q.No Questions Marks CO BL

i)Sketch the digital signature model based on Elgamal digital 5 CO4 4


signature scheme and prove the correctness of its verification
process.

ii) Perform the following in the elliptic curve Ezs(1,1)


a. Check if (19,5) is a point in the curve. 2
b. IfP= (9,7) and Q=(7,11) are two points in the curve, CO4 4
find P+Q and 2P. 3
C. Analyze the similarities between Diffie Hellman Key
exchange and Elliptic curve key exchange. 4

BL - Bloom's Taxonomy Levels (1- Remembering, 2- Understanding, 3 -Applying, 4


Analysing, 5 -Evaluating, 6 - Creating)
CO- Course Outcomes
Q.No CO6. CO5. CO4. CO3. CO2. CO1: Course
14/11/2023
B.Tech
Date (|:T7/)8
5 4 3 2 1
6.
a. Q.No
To To
Evaluate security
To
PredictApply
Outcomes:
Definealgorithm
message WhatDescribe and In
fromher. Explain fromsecurity. designmanageidentify
the
(Assumep=
11,q=3,e private
i)=3)value
. y solution the the Madras
is
messageUsing i)
Perform
a.
b. Security
traditional Diffie-Hellman = basic
howthreshold the 5. the any
secured thevulnerabilities
curve, IfP=Check for Alice system
keys, RSAM Bob Compute
role firewall
network forsecurity Institute
the R has IT5703
find (9,7) = Association cryptographic
of
web any Department
if
following when
Cryptosystem, finds
cryptography, related
(19,5) calculate 13 used proxy thQuestions
andQ=(7,11)
P+Q to e
protocol, applications security
computing
and algorithms
CRYPTOGRAPHY of
out across Technology,
is Alice Questions
Alice. (2X13=26
Marks)
Part-B symmetric vulnerabilities WLAN Assessment
Test Il
and
when what firewalls
a in the Regulation
2019 of
e
and techniques? issues any
2P,
point threcovers
Dubli UsingCallie explain
Cryptographic he and g
= security. and Information
elliptic ciphertext receives in system.computing
in inkey 7,p= real-time. and policies
are the how network Chromepet,
Alice'wants
s its and resolve
two curve
curve. the does 23,x=3 AND
purpose. a mitigation.
points C, to
public PGP required
system Technology
message.
E23(1,1) and send it SECURITY
differ the Chennai
:a4at in
the the and the issues. and for
2 2 2 2Marks
hence a Maximum
Marks:50
8 5 MarksCO computing Time 600 -
b CO3 CO3 CO1 CO4 CO1 be 044.
CO1 CO1 CO :
able 90
system. minutes
to
3 BL 1 2 2 4 3 design
BL
(OR)
i) Explain the principles of Elgamal Cyptosysterm with 5 CO1 1
an example. scheme
) Using Digital Signature Standard (DSS) r
6. b. let q 101, p = 8081,e, 3, random number 8 CO1 3
values of e, and
61 and private key d=61. Find theH(M)=5000.
e; Findthe value of S, and S, if Verify
the signature.
)Walk through the steps of the Kerberos 5
CO3
2
7.a. authentication process, detailing the interactions
between the user, AS, TGS, and the target service.
CO1
ii) Explain the compression function and the structure 8 2
of each roundin SHA 512 (x DOCMOTXASt Z3
(OR)
CO1
i) Explain the structure and components of an X.509 5 1
7.b.
certificate.
ii) Give the key features, participants and the working 8
CO3
2
of acommunication protocol standard for securing
credit card transactions over the Internet 1
Part-C (1X14=14 Marks)
Q.No Questions Marks CO BL

8 What are the security issues associated with 14 CO5 5


Aadhaar card? Provide solutions to mitigate the
security issues.

BL - Bloom's Taxonomy Levels (1- Remembering, 2- Understanding, 3 - Applying.


4- Analysing, 5-Evaluating, 6 - Creating)
CO- Course Outcomes
RollNo.
ANNA UNIVERSITTY (UNIVERSITY DEPARTMENTS)

BE./B. Tech /B. Arch (Pull Time) -END SEMESTER EXAMINATIONS, NOV/DEC 2023
INFORMATION TECHNOLOGY
VII Semester
ADDI IT5703 & Cryptographyand Security
YNNTH (Regulation 2019)
Time: 3hrs Max.Marks: 100
PART- A(10 x2 =20 Marks)
(Answer all Questions)
Q.No Questions Marks
1 Define Euler's theorem and solve 6 mod 35 using Euler's theorem. 2
Illustrate with an example Denial-of-Service attack. 2
3 State the advantages of Triple-DES and give its structure.
4 Compare and contrasi Block and Stream Ciphers. 2
5 How elliptic curve cryptography is considered to be better than RSA?
6 What is the number of padding bits if the length of the original message is 2590
bits in SHA 512?
7 What is public key certificate and give the requirements for the use of public 2
key certificate scheme.
8 Define the parameters that define an SSL session state.
Suggest some measures to mitigate Buffer overflow.
10 Differentiate between viruses and worms.

PART- B(5 x13 =65 Marks)


(Restrict to a maximum of 2 subdivisions)
Q. No Questions Marks
11(a) (1) Solve the following system of simultaneous congruences using Chinese 9
remainder theorem:
X=6(mod 11),
x= 13(mod 16),
X=9 (mod 21),
X=19 (mod 25).
(i1)Use Vignerc cipher to encryp! the word "University" using the keyword "anna". 4

(OR)
11(6) () Apply extended euclidean theorem to identify the ged oftwo numbers 4999 and
1109. Also determine the required variables mand nto suit the equation 4999m
+ 1109n=gcd(4999, 1109).
()Use Playfair Cipher to encryptthe message "Anna University", using the 5 X5 4
matrix secret key. Decryption not required.
L G D B A

M H E

U R I/J
X S K

Y W
OTAMINA
AU
CHENNA
60a
B25

IYNO
|12 (a) () Describe the structure, mode of operation, key generation
processes of Data
Encryption Standard.
(i) Analyze the strength and weaknesses of DES. 4

(OR)
12(b) (i) Explain the structure and mode of operation of RC4 Cipher. 9
(ii) Discuss in detail about key Expansion process of AES symmetric crypto 4
systen.

13(a) (i)Brieflyexplain Diffie-Hellman Key Exchange.


(1)Consider a Diffie-Hellman scheme with a common prime q =11 and a
primitive root a =2.
a) Show that 2 is the primitive root of 11.
b) If user Alice has public key, YA9, what is A's private key XA ?
c) Ifuser Bob has public key YB=3, what is the secret keyK shared with
Alice?

(OR)

13(6) (1)Discuss about Elgammal public key Crypto system. 4


(i) Consider an Elgamal scheme with a common prime q = 71 and a primitive root
a=7. N1
a. If Bob has public key YB =3 and A choose the random integer k = 2,
what is the ciphertext of M=30?
b. If Alice now chooses a different value of k so that the encoding of M =
30is C = (59, C2), What is the integer C2?
14 (a) Explain briefly about the modes of operation of IP Security and its security 13
services. Alsoelaborate on Security association and relevant databases
maintained for IPSec.
(OR)

14 (b) Discuss in detail about the TLS architecture, services, session and connection 13
information and algorithms involved in key-exchange and compression
processes.

15 (a) Discuss in detail about the importance of Firewalls, its working functionalities 13
and categories of Firewalls.
(OR)

15 (b) Explain about the security aspects of wireless LAN. 13

PART- C(1x 15 =15 Marks)


(Q.No. 16 is Compulsory)

Q. No Questions Marks
16 Express your views and opinions about the causes of various cyber threats like 15
ransomware attacks, phishing attacks, system intrusion and social
engineering.Also suggest some technical aspects to mitigate them.
(NNA UNNERSITY
CHENNA-25 Roll No.

ANNA UNIVERSITY (UNIVERSITY DEPARTMENTS)

B.E./B. Tech /B. Arch (Full Time) -END SEMESTER EXAMINATIONS, NOV / DEC 2022
INFORMATION TECHNOLOGY
Semester 7
IT5703 Cryptography and Security
(Regulation 2019)
Time: 3 hrs Max. Marks: 100

CO 1 Apply the basic security algorithms and policies required for a computing system.
CO 2 Predict the vulnerabilities across any computing system and hence be able to design
security solution for any computing system.
CO3 To identify any network security issues and resolves the issues.
CO 4 To manage the firewall and WLAN security.
CO5 Evaluate the systemrelated vulnerabilities and mitigation.
CO 6 To design secured web applications in real-time.
BL Bloom's Taxonomy Levels
(L1- Remembering, L2 - Understanding., L3 - Applying,L4 -Analyzing, L5 -Evaluating, L6 -Creating)
PART- A(10 x 2 = 20 Marks)
(Answer all Questions)

Q. No Questions Marks CO BL
1 Find the result of 32023 mod 461 using square and multiply. 2 CO 1 3
In GF(24), find the inverse of (*² +1) modulo(* +x+ 1) 2 CO 1 3
3 Explain the significance of Fiestel Cipher in DES. 2 CO 2 2
4 Illustrate encryption in counter (CTR) mode. 2 CO 2 1
5 Explain man-in-the-middle attack in Diffie-Hellman Key 2 CO 3 3
exchange?
6 In SHA-512, what is the number of padding bits if the length of 2 CO 3
the original message is 2590 bits?
7 Can blockchain prevent identity theft? Give reasons. 2 CO5 6
o8
List any four services of PGP. 2 CO 5
Explain Buffer Overflow attack? CO 5
10 Give any four security issues in Cloud Computing. 2 CO 3 2

PART- B(5 x13 =65 Marks)


(Restrict to a maximum of 2 subdivisions)
Q. No Questions Marks CO BL
11 (a) () Use the Chinese Remainder Theorem to find an x such that 7 CO 1 3
x=3(mod 7)
x=3(mod 15) X
x=4(mod 12)
(ii) Use the Vigenere cipher with the keyword "HEALTH" to encrypt 6 CO 1 4
the message "Life is full of surprises"
OR
11 (b) () Perform the following in the elliptic curve Ezs(1,1) 7 CO 1 3
a. Check if (19,5) is a point in the curve.
b. IfP= (9,7) andQ= (7,11) are two points in the curve,find
P+Q and 2P.
6 CO 1 2
(i)Find the result of multiplying P, = (x5 +x' +x) by P, =
(x?+xtx+x?+x) in GF(29) with irreducible polynomial
(x84x+x +x t 1). 13 CO 2 2
12 (a) () Perform the Encryption using Simplified DES. Let the plaintext be
0010010111. The
the string 101001001. Let the 10 bit key be
Permutation tables and Sboxes are given below:

P10= 35274 10 1986


P8=63 7485109
P4 = 2 4 3 1

Initial Permutation (|P) = 2631 4857


Inverse Permutation (IP -1) =4135 72 86 ANA NHVERSITYS
Expansion Permutation (E/P) =4123 2341

SO = 1
0
0

3
1
1 0 3 2]
2
2

1
3

SI = 1
01 2 3
1 2 3|
0 1 3
CHEN AN-25
2 1 2 3 0 1 0
3 1 3 3 2 I 0 3

OR
13 CO 2 1
12 (b) (0) Explain the basic structure and transformations of Advanced
Encryption Standard. CO 3 2
round 13
13 (a) (i) Explain the compression function and the structure of each
in SHA-512
OR
7 CO3
13 (b) () Using EIGamal cryptosystem, given prime p=31;
calculate e,
a. Choose and appropriate e1 and d, then
b. Encrypt the message "SECURITY".
C. Decrypt the ciphertext to obtain the plaintext. 6 CO 3 2
() Explain various attacks on RSA Cryptosystem. 13 4
14 (a) () Give the key features, participants and the working of a
communication protocol standard for securing credit card
transactions over the Internet.
OR
CO 5 5
14 (b) (0) Using Digital Signature Standard (DSS) scheme, let q = 59,
7
Choose
p= 709, e, = 3 and d = 14. Find the values of e, and e,.
r=13. Find the value of S, and S, if H(M)=100. Verify the
signature.
Briefly explain the authentication protocol that works based on
6 CO 5 3
()
tickets that is used in open or unsecure computer networks.
15 (a) (i) Give an overview of Intrusion Detection and Prevention Systems. 13 CO 4 1
OR
15 (b) () Explain Cloud Computing Security challenges and solutions.
13 CO 4 4

PART- C (1 x 15 = 15 Marks)
(Q.No.16 is compulsory)
Q. No Questions Marks CO BL
16. i) What is the need of security in Online Social Networks (0SN). 3 CO6 6
i) Discuss the security and privacy issues in OSN. 5
ii) Proposed possible defense solutions to secure OSNA 7

You might also like