Model - QP Ccs
Model - QP Ccs
Date & Time: 25.11.2024 & 1.30 to 4.30 PM Maximum Marks: 100
PART A (10 x 2 = 20 Marks) Bloom’s
CO
Answer ALL Questions Level
11 b) CO1 K3
1
counter measures. Perform decryption and encryption using RSA
algorithm with p=3, q=11, e=7, n=5.
(OR)
Apply the Diffie-Hellmann key exchange technique with a
common prime q=11 and a primitive root alpha a=7.
13 b) (i) If user A has private key XA =3. What is A’s public key YA? CO3 K3
(ii) If user B has private key XB =6. What is B’s public key YB?
(iii) What is the shared secret key? Write the algorithm.
Explain about an authentication scheme for mutual
(i) authentication between the user and the server which relies on CO4 K2
symmetric encryption. (7)
Explain the Needham Schroeder authentication protocol with
(ii) CO4 K2
neat sketch. (6)
(OR)
Explain various attacks on kerberos and how it provides
14 b) CO5 K2
authentication service.
Assume when an attacker tries to modify the database content by
inserting an update statement. Identify this SQL injection attack
15 a) CO5 K4
method and justify. Detail the methods used to prevent SQL
injection method.
(OR)
Demonstrate how Spyware functions and its impact on privacy
15 b) and data security. What steps can individuals and organizations CO5 K2
take to detect and prevent Spyware Infections?
PART C (1 x 15 = 15 Marks)
16 a) Summarize the format and the elements of the X.509 certificate. CO5 K2
(OR)
16 b) Explain in detail about substitution techniques. CO5 K2
2
Weightage of Marks
Subject Code & Title: CB3491 – CRYPTOGRAPHY AND CYBER SECURITY
Revised Blooms Taxonomy Marks in each Divisions
Level (BTL) Total
% of
Marks for
Knowledge Level Distribution
Part - A Part - B Part - C each BTL
Remembering K1 16 16 16
Applying K3 39 39 19.5
Analyzing K4 20 20 10
Evaluating K5
Creating K6
Total 20 130 30 180 100
Note:
The weightage for different cognitive levels (BTL) in the question papers can also
vary from course to course.