Crypto - QP
Crypto - QP
Maximum Marks:50
Assessmnent TestI
7/8 B.Tech -IT Time :90 minutes
Date: 19/09/2023
CourseOutcomes:
Sl=[0 S0 P4Encrytpion
Expansion IPSDES
IP Generation:
P8P10 Key the Let AES.necessary
diagrams.
b) b) a)Analyze a)i.
=[1=2 inverse =26 i. i. i.
=63 =3 ciphertext the Explain Describe Sketch Explain
4
032;32 3 3 5274
74 10 its
2 123;20 1 1 bit
-
= 4 the strength
12
0 permutation 4 85 how the the
using key
32 1385 109 10 structure
572 7 basic single
198 be keys
110; Simplified-DES.
1101011010. and
8)32 2 3;3 0
2 =86 6 are structure weaknesses.
of round
0 1 4 generated Triple
1 3; 12323
0; QuestionsPart-C and operation
2 13 The OR IDES
03] 132] 4 transformations
ciphertext for and
1 (1
x the of
14=14 different explain
need.its
Data
20l3 is
0110 Marks) involved Encryption
round
1001.
2laintet operations in
Decrypt AES Standard.
with
the of
Marks
14 4 9
9
2 2 2
2
2
Roll Nurmber:
DEPARTMENT OF INFORMATION TECHNOLOGY
ASSESSMENT1
Seventh Semester
IT5703 CRYPTOGRAPHY AND SECURITY
(Regulation 2019)
29th September 2022
CO1 Apply the basic security algorithms and policies required for a computing systerm.
CO2 Predict the vulnerabilities across any computing system and hence be able to design
security solution for any computing system.
CO3 To identify any network security issues and rcsolve the issues.
CO4 To manage the firewall and WLAN security.
CO5 Evaluate the system related vulnerabilities and mitigation.
CO6 To design secured web applications in real-time.
BL -Bloom's Taxonomy Levels
(LI -Remembering, L2 -Understanding, L3- Applying, L4- Analysing, L5 - Evaluating, L6
- Creating)
PART A (5x2 = 10 marks)
(Answer all Questions)
1. Describe different types of attacks threatening the confidentiality of information. Marks:2,
CO:2, BL:L1]
2. List the criteria defined by NIST for AES. Marks:2, CO:2, BL:L1
3. Use the Playfair cipher to encipher the message The key is hidden under the door
pad" The secret key can be made by using the keyword "GUIDENCE".Marks:2,
CO:1, BL:L2]
4. Find the result of the following: (a) 456" mod 17 (b) 20- mod 403
Marks:2, CO:1,
BL:L2)
5. Find the result of 3202 mnod 461 using square and
multiply. Marks:2, CO:1, BL:L2
PART B(40 marks)
6.(a) (i) The plaintext letusmeetnow" and the corresponding ciphertext
are given. You know that the algorithm is a Hill cipher, but you"HBCDFNOPIKLB"
of the key. Find the key matrix. Marks:7, CO:1, BL:L3 don't know the size
(OR)
T.(b) (() Let f(z) = z +a+g+22++1 and g(z) =g'++1 with an
irreducible polynomial
m(u) = z + a + ° +a+1. Perform f() + g(u) and f() *g() in GF(2). [Marks
:7,C0:1,BL:L3)
1
(1) Given a Ciphcrtext CRIWWZ. Its plaintext starts witlh TIA' Find the key and the
remaning plaintext characters using Afine cipher. [Marks:6 ,CO:1BL :3)
8.(a) () Explain the significance of Feistel Cipher in symmetric block cipher. Marks:7, CO2,
BL:L2)
(i) Describe any 3 block cipher modes of operation. (Marks:6, CO:2, BL:L2)
(OR)
Marks:7 CO:2,
9.(a)(1) Explain the general structure of Advanced Encryption Standard (AES).
BL:L1|
criteria and de
(ii) Explain any two wealkness of DES. Analyse DES based on the Design
sirable block cipher properties. Marks: 6, CO: 1, BL :3)
10. Perform the Encryption using Simplified DES. Marks:14, CO:2, BL:L3
The
Let the plaintext be the string 0010 1000. Let the 10 bit key be 1100011110.
Permutation tables and Sboxes are given below:
Key Generation
P103 5274 10 1 986
P8-6 3 74 85 10 9
SDES Encryption
Initial Permutation (IP) =2 63 1 4 857
Inverse Permutation (IP-') =4 135 7286
Expansion Permutation (E/P)= 4 123 2341
P4 243 1
012 3 0 12 3
0 0 3 2] 1 2
SO =1 3 2 1 0 S1 = 1 2 0 1 3
2 0 2 1 3 2 01 0
3 1 3 2| 2 1 0 3|
-oOo
4 54
2 CO6 2
5 Compare public and private blockchains.
7
OR
b. i) What are public key certificates? State their need and 6 COS 2
sketch the message format.
BE./B. Tech /B. Arch (Pull Time) -END SEMESTER EXAMINATIONS, NOV/DEC 2023
INFORMATION TECHNOLOGY
VII Semester
ADDI IT5703 & Cryptographyand Security
YNNTH (Regulation 2019)
Time: 3hrs Max.Marks: 100
PART- A(10 x2 =20 Marks)
(Answer all Questions)
Q.No Questions Marks
1 Define Euler's theorem and solve 6 mod 35 using Euler's theorem. 2
Illustrate with an example Denial-of-Service attack. 2
3 State the advantages of Triple-DES and give its structure.
4 Compare and contrasi Block and Stream Ciphers. 2
5 How elliptic curve cryptography is considered to be better than RSA?
6 What is the number of padding bits if the length of the original message is 2590
bits in SHA 512?
7 What is public key certificate and give the requirements for the use of public 2
key certificate scheme.
8 Define the parameters that define an SSL session state.
Suggest some measures to mitigate Buffer overflow.
10 Differentiate between viruses and worms.
(OR)
11(6) () Apply extended euclidean theorem to identify the ged oftwo numbers 4999 and
1109. Also determine the required variables mand nto suit the equation 4999m
+ 1109n=gcd(4999, 1109).
()Use Playfair Cipher to encryptthe message "Anna University", using the 5 X5 4
matrix secret key. Decryption not required.
L G D B A
M H E
U R I/J
X S K
Y W
OTAMINA
AU
CHENNA
60a
B25
IYNO
|12 (a) () Describe the structure, mode of operation, key generation
processes of Data
Encryption Standard.
(i) Analyze the strength and weaknesses of DES. 4
(OR)
12(b) (i) Explain the structure and mode of operation of RC4 Cipher. 9
(ii) Discuss in detail about key Expansion process of AES symmetric crypto 4
systen.
(OR)
14 (b) Discuss in detail about the TLS architecture, services, session and connection 13
information and algorithms involved in key-exchange and compression
processes.
15 (a) Discuss in detail about the importance of Firewalls, its working functionalities 13
and categories of Firewalls.
(OR)
Q. No Questions Marks
16 Express your views and opinions about the causes of various cyber threats like 15
ransomware attacks, phishing attacks, system intrusion and social
engineering.Also suggest some technical aspects to mitigate them.
(NNA UNNERSITY
CHENNA-25 Roll No.
B.E./B. Tech /B. Arch (Full Time) -END SEMESTER EXAMINATIONS, NOV / DEC 2022
INFORMATION TECHNOLOGY
Semester 7
IT5703 Cryptography and Security
(Regulation 2019)
Time: 3 hrs Max. Marks: 100
CO 1 Apply the basic security algorithms and policies required for a computing system.
CO 2 Predict the vulnerabilities across any computing system and hence be able to design
security solution for any computing system.
CO3 To identify any network security issues and resolves the issues.
CO 4 To manage the firewall and WLAN security.
CO5 Evaluate the systemrelated vulnerabilities and mitigation.
CO 6 To design secured web applications in real-time.
BL Bloom's Taxonomy Levels
(L1- Remembering, L2 - Understanding., L3 - Applying,L4 -Analyzing, L5 -Evaluating, L6 -Creating)
PART- A(10 x 2 = 20 Marks)
(Answer all Questions)
Q. No Questions Marks CO BL
1 Find the result of 32023 mod 461 using square and multiply. 2 CO 1 3
In GF(24), find the inverse of (*² +1) modulo(* +x+ 1) 2 CO 1 3
3 Explain the significance of Fiestel Cipher in DES. 2 CO 2 2
4 Illustrate encryption in counter (CTR) mode. 2 CO 2 1
5 Explain man-in-the-middle attack in Diffie-Hellman Key 2 CO 3 3
exchange?
6 In SHA-512, what is the number of padding bits if the length of 2 CO 3
the original message is 2590 bits?
7 Can blockchain prevent identity theft? Give reasons. 2 CO5 6
o8
List any four services of PGP. 2 CO 5
Explain Buffer Overflow attack? CO 5
10 Give any four security issues in Cloud Computing. 2 CO 3 2
SO = 1
0
0
3
1
1 0 3 2]
2
2
1
3
SI = 1
01 2 3
1 2 3|
0 1 3
CHEN AN-25
2 1 2 3 0 1 0
3 1 3 3 2 I 0 3
OR
13 CO 2 1
12 (b) (0) Explain the basic structure and transformations of Advanced
Encryption Standard. CO 3 2
round 13
13 (a) (i) Explain the compression function and the structure of each
in SHA-512
OR
7 CO3
13 (b) () Using EIGamal cryptosystem, given prime p=31;
calculate e,
a. Choose and appropriate e1 and d, then
b. Encrypt the message "SECURITY".
C. Decrypt the ciphertext to obtain the plaintext. 6 CO 3 2
() Explain various attacks on RSA Cryptosystem. 13 4
14 (a) () Give the key features, participants and the working of a
communication protocol standard for securing credit card
transactions over the Internet.
OR
CO 5 5
14 (b) (0) Using Digital Signature Standard (DSS) scheme, let q = 59,
7
Choose
p= 709, e, = 3 and d = 14. Find the values of e, and e,.
r=13. Find the value of S, and S, if H(M)=100. Verify the
signature.
Briefly explain the authentication protocol that works based on
6 CO 5 3
()
tickets that is used in open or unsecure computer networks.
15 (a) (i) Give an overview of Intrusion Detection and Prevention Systems. 13 CO 4 1
OR
15 (b) () Explain Cloud Computing Security challenges and solutions.
13 CO 4 4
PART- C (1 x 15 = 15 Marks)
(Q.No.16 is compulsory)
Q. No Questions Marks CO BL
16. i) What is the need of security in Online Social Networks (0SN). 3 CO6 6
i) Discuss the security and privacy issues in OSN. 5
ii) Proposed possible defense solutions to secure OSNA 7