0% found this document useful (0 votes)
9 views3 pages

Model - QP Ccs

Uploaded by

y.fayaz71
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Model - QP Ccs

Uploaded by

y.fayaz71
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

RVS COLLEGE OF ENGINEERING AND TECHNOLOGY

(An Autonomous Institution, Affiliated to Anna University Chennai)


Coimbatore – 641 402.
Model Examination (Nov/Dec 2024)
Regulation : 2021 Department : CSE Year: III Semester : V
CB3491 – CRYPTOGRAPHY AND CYBER SECURITY

Date & Time: 25.11.2024 & 1.30 to 4.30 PM Maximum Marks: 100
PART A (10 x 2 = 20 Marks) Bloom’s
CO
Answer ALL Questions Level

1. Compare Active and Passive attack with example. CO1 K2


How will you encrypt the plain text “Have a blast year with full of
2. CO1 K1
blissfulness” with the key=3201 using row Transposition technique.
3. Find GCD (2740, 1760) Using Euclidean algorithm. CO2 K3
4. Define field and ring in number theory. CO2 K1
Explain how the User X and Y exchange the key using Diffie-Hellmann
5. algorithm. Assume a=5, q=11, XA=2, XB=3. Find the value of YA, YB, CO3 K2
and K.
6. Formulate Fermat’s theorem hold for p=5, and a=2. CO3 K2
7. List any three requirements for authentication. CO4 K1
8. What is message authentication code? How it differ from Hash function? CO4 K1
9. Define Key Loggers. CO5 K1
10. List out the key principles and practices of cloud security. CO5 K1
PART B (5 x 13 = 65 Marks)
Answer ALL Questions
Explain the network security with its parameters with a neat
(i) CO1 K2
11 a) block diagram. (7)
(ii) Classify the various Security mechanism. (6) CO1 K2
(OR)
Apply hill cipher to encrypt the message “Taison” with the Key
K1 and show the decryption to get the original plain text.

11 b) CO1 K3

Illustrate the structure of AES and round functions with neat


12 a) CO2 K2
sketch.
(OR)
Distinguish the properties that are satisfied by Groups, Ring and
(i) CO2 K2
12 b) Fields. (7)
(ii) Interpret any one pseudo random number generator algorithm.(6) CO2 K2
13 a) Identify the possible threats for RSA algorithm and list their CO3 K3

1
counter measures. Perform decryption and encryption using RSA
algorithm with p=3, q=11, e=7, n=5.
(OR)
Apply the Diffie-Hellmann key exchange technique with a
common prime q=11 and a primitive root alpha a=7.
13 b) (i) If user A has private key XA =3. What is A’s public key YA? CO3 K3
(ii) If user B has private key XB =6. What is B’s public key YB?
(iii) What is the shared secret key? Write the algorithm.
Explain about an authentication scheme for mutual
(i) authentication between the user and the server which relies on CO4 K2
symmetric encryption. (7)
Explain the Needham Schroeder authentication protocol with
(ii) CO4 K2
neat sketch. (6)
(OR)
Explain various attacks on kerberos and how it provides
14 b) CO5 K2
authentication service.
Assume when an attacker tries to modify the database content by
inserting an update statement. Identify this SQL injection attack
15 a) CO5 K4
method and justify. Detail the methods used to prevent SQL
injection method.
(OR)
Demonstrate how Spyware functions and its impact on privacy
15 b) and data security. What steps can individuals and organizations CO5 K2
take to detect and prevent Spyware Infections?
PART C (1 x 15 = 15 Marks)

16 a) Summarize the format and the elements of the X.509 certificate. CO5 K2
(OR)
16 b) Explain in detail about substitution techniques. CO5 K2

Subject Handling Faculty IQAC-Coordinator HoD-CSE

2
Weightage of Marks
Subject Code & Title: CB3491 – CRYPTOGRAPHY AND CYBER SECURITY
Revised Blooms Taxonomy Marks in each Divisions
Level (BTL) Total
% of
Marks for
Knowledge Level Distribution
Part - A Part - B Part - C each BTL
Remembering K1 16 16 16

Understanding K2 4 71 30 105 54.5

Applying K3 39 39 19.5

Analyzing K4 20 20 10

Evaluating K5
Creating K6
Total 20 130 30 180 100

Note:
 The weightage for different cognitive levels (BTL) in the question papers can also
vary from course to course.

 Depending upon the course, Evaluate Create can be incorporated.

Subject Handling Faculty IQAC-Coordinator HoD-CSE

You might also like