0% found this document useful (0 votes)
18 views4 pages

IT702A

The document outlines the examination structure for the Cryptography and Network Security course at Narula Institute of Technology for the academic year 2022-2023. It includes multiple choice questions, short answer questions, and long answer questions covering various topics in cryptography and network security. The exam is designed to assess students' knowledge, comprehension, and application of the subject matter.

Uploaded by

Tanmoy Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views4 pages

IT702A

The document outlines the examination structure for the Cryptography and Network Security course at Narula Institute of Technology for the academic year 2022-2023. It includes multiple choice questions, short answer questions, and long answer questions covering various topics in cryptography and network security. The exam is designed to assess students' knowledge, comprehension, and application of the subject matter.

Uploaded by

Tanmoy Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NARULA INSTITUTE OF TECHNOLOGY

An Autonomous Institute under MAKAUT

B. TECH./IT/ODD/SEM 7/R_18/ IT702A/2022-2023


YEAR: 2022

CRYPTOGRAPHY AND NETWORK SECURITY


IT702A
TIME ALLOTTED: 3 HOURS FULL MARKS: 70
The figures in the margin indicate full marks.
Candidates are required to give their answers in their own words as far as practicable
GROUP – A
(Multiple Choice Type Questions)
1. Answer any ten from the following, choosing the correct alternative of each question: 10×1=10
SL Question Marks Co Blooms
Taxonomy
Level
(i) The Cryptography can provide 1 CO1 Knowledge
(a) entity authentication
(b) nonrepudiation of messages
(c) confidentiality
(d) All of them

(ii) The cipher which uses the exclusive-or operation as defined in computer 1 CO1 Knowledge,
science is called Comprehension
(a) Caesar cipher
(b) XOR cipher
(c) Cipher
(d) Cipher text

(iii) For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where 1 C02 Application
message=5 and find the cipher text.
(a) C=80
(b) C = 92
(c) C= 56
(d) C = 23

(iv) When a hash function is used to provide message authentication, the 1 CO2 Knowledge,
hash function value is referred to as Comprehension
(a) Message Field
(b) Message Digest
(c) Message Score
(d) Message Leap

(v) Data Authentication Algorithm (DAA) is based on 1 CO2 Knowledge


(a) DES
(b) AES
(c) MD-5
(d) SHA-1

Odd semester theory examination 2022 under autonomy, 14th-DEC-22


Page 1 of 4
NARULA INSTITUTE OF TECHNOLOGY
An Autonomous Institute under MAKAUT

(vi) The DES algorithm has a key length of 1 CO2 Application


(a) 128 Bits
(b) 32 Bits
(c) 64 Bits
(d) 16 Bits
(vii) The number of rounds in RC5 can range from 0 to 1 CO2 Knowledge,
(a) 127 Comprehension
(b) 63
(c) 255
(d) 31

(viii) HTTP stands for 1 CO3 Knowledge,


(a) Hash Text Transfer Protocol Comprehension,
(b) Hyper Text Transfer Protocol Application
(c) Hash Transfer Text Protocol
(d) none of the mentioned

(ix) A small program that changes the way a computer operates. 1 CO1 Knowledge,
(a) Worm Comprehension
(b) Trojan
(c) Virus
(d) Bomb

(x) A cipher in which the order is not preserved 1 CO1 Knowledge


(a) Polyalphabetic substitution based
(b) Transposition-based
(c) Substitution based
(d) Public key based

(xi) How many layers are there in the OSI reference model? 1 CO3 Comprehension
(a) 4
(b) 5
(c) 6
(d) 7

(xii) In Asymmetric-Key Cryptography, although RSA can be used to 1 CO2CO4 Application


encrypt and decrypt actual messages, it is very slow if the message is
(a) Short
(b) Long
(c) Flat
(d)Thin

GROUP – B
(Short Answer Type Questions)
Answer any three from the following: 3×5 = 15
SL Question Marks Co Blooms
Taxonomy
Level
2. (a) What are passive threats and active threats? 2 CO1 Knowledge,
Odd semester theory examination 2022 under autonomy, 14th-DEC-22
Page 2 of 4
NARULA INSTITUTE OF TECHNOLOGY
An Autonomous Institute under MAKAUT

Comprehension,
Application
(b) Differentiate between passive threats and active threats. 3 CO1 Knowledge,
Comprehension
3. List and briefly explain different types of Firewalls. 5 CO3 Knowledge,
Comprehension
4. (a) What is PGP? 3 CO3 Knowledge,
Comprehension
(b) What is ‘packet snooping’ and ‘packet spoofing’? 2 CO1 Knowledge
CO2
5. (a) What is key wrapping? 2 CO2 Application
(b) How is key wrapping useful? 3 CO2 Application
6. Explain Cipher Block Chaining mode with a suitable diagram. 5 CO1 Knowledge
GROUP – C
(Long Answer Type Questions)
Answer any three from the following: 3×15=45
SL. Question Marks Co Blooms
Taxonomy
Level
7. (a) What is the difference between stream cipher and block cipher? 2 CO1 Knowledge,
Comprehension,
Application
(b) What types of attacks may occur on block ciphers? 4 CO1 Knowledge
(c) Describe a single round of DES with block diagram. 7 CO3 Knowledge,
CO4 Comprehension
(d) “Authentication can be achieved using DES”- Comment on it. 2 CO3 Knowledge,
CO4 Comprehension,
Application
8. (a) What is electronic money? 2 CO3 Knowledge
(b) What is SET? Explain with a suitable model. 7 CO3 Knowledge,
Comprehension
(c) How pre-master-secret and master-secret is prepared in SSL 3 CO3 Comprehension
handshake protocol?
(d) Describe the fields of SSL record protocol header. 3 CO3 Knowledge
9. (a) Explain with the figure how secure socket layer (SSL) is 5 CO3 Knowledge,
accommodated in TCP/IP protocol suite. Comprehension
(b) Explain briefly, in the PGP, that how Bob and Alice exchange the 7 CO3 Application
secret key for encrypting messages.
(c) What are the different security services provided by PGP? 3 CO3 Knowledge,
Comprehension
10. (a) Briefly describe the RSA algorithm and show how it provides security 9 CO2 Knowledge,
to message / data. Comprehension,
Application
(b) How digital signatures can be generated? 4 CO2 Knowledge
(c) What does digital signatures provide to a message? 2 CO3 Comprehension
11. (a) What are the differences between symmetric key and asymmetric key 3 CO1 Knowledge,
cryptography? Comprehension,
Odd semester theory examination 2022 under autonomy, 14th-DEC-22
Page 3 of 4
NARULA INSTITUTE OF TECHNOLOGY
An Autonomous Institute under MAKAUT

Application
(b) What do you mean by message digest? 3 CO2 Comprehension
CO3
(c) What is a digital envelope? Explain, how it works. 2+3 CO2 Knowledge,
CO3 Comprehension
(d) What is firewall? What are the limitations of firewall? 2+2 CO3 Knowledge,
Comprehension,
Application

Odd semester theory examination 2022 under autonomy, 14th-DEC-22


Page 4 of 4

You might also like