0% found this document useful (0 votes)
72 views2 pages

Cryptography Model Question Paper Final

This document is a model question paper for the Cryptography and Network Security course at P.E.S. College of Engineering. It includes two parts: Part A with compulsory questions from each unit and Part B with detailed questions for each unit. The questions cover various topics such as encryption methods, public key systems, cryptographic hash functions, security risks in cloud computing, and IPsec applications.

Uploaded by

B38 PRERANA.M.C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views2 pages

Cryptography Model Question Paper Final

This document is a model question paper for the Cryptography and Network Security course at P.E.S. College of Engineering. It includes two parts: Part A with compulsory questions from each unit and Part B with detailed questions for each unit. The questions cover various topics such as encryption methods, public key systems, cryptographic hash functions, security risks in cloud computing, and IPsec applications.

Uploaded by

B38 PRERANA.M.C
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

P.E.S.

College of Engineering, Mandya


(An Autonomous Institution affiliated to VTU, Belagavi)
Seventh Semester, B.E .-Electronics and Communication
Cryptography and Network Security (P21EC7022)
MODEL QUESTION PAPER
---------------------------------------------------------------------------------------------------------------------------------------------------------------
Note: i) Part – A is compulsory, One question from each unit
ii) Part – B: Part – B: Answer any sub questions for Max .of 18 marks from each unit.
Q. No. Questions Marks Bloom’s
Taxonomy
PART – A 10 BL CO PO
Unit – I to V
a Consider a Caesar Cipher method write an appropriate equations for 2 2 1 1
plain text and cipher text.
b What are the basic principles of public key crypto systems. 2 2 1 1
c List and briefly explain application of cryptographic Hash functions 2 2 2 1
d Compare between SSL connection and an SSL session 2 2 2 1
e Summarize the key functional components of the Internet mail 2 2 1 1
architecture.
PART – B 90
Unit – I 18
1 a Encrypt the message “meet me at the usual place at ten rather than eight 9 4 2 1,2
o’clock” using the Hill cipher. Show your calculations and the result.

Key =
b Illustrate the overview of Data encryption Standard with necessary 9 2 2 2
diagram and highlights its operations.
c Describe the four types of transformation functions used in AES. 9 2 2 2
Unit – II 18
2 a In a public key system, using RSA algorithm you intercept the cipher 9 4 2 2
text C = 10 sent to a user whose public key is e = 5, n = 35. Perform
decryption to recover the Plain text M and also compute user’s private
key.
b Explain and compare how Diffie-Hellman key exchange algorithm 9 3 2 2
useful in evaluate Man-in-the-Middle Attack concept.
c Consider an ElGamal scheme with a common prime q = 71 and a 9 4 2 2
primitive root α = 7.
a. If B has public key YB = 3 and A chose the random integer k = 2, what
is the ciphertext of M = 30?
b. If A now chooses a different value of k so that the encoding of M = 30
is C = (59, C2), what is the integer C2?
Unit – III 18
3 a Summarize the applications of cryptographic hash functions 9 3 3 2,3

b Briefly explain the HMAC algorithm 9 2 2 2

c Interpret the working of Elgamal Digital Signature scheme. 9 2 3 2,3


Unit – IV 18
4 a Interpret are the primary security risks associated with cloud computing. 9 2 3 2,3
b Explain ESP packet format. 9 3 3 2,3
c Explain the concept of transport and tunnel modes. 9 2 3 2,3
Unit – V 18
a Summarize the benefits and applications of IPsec. 9 2 2 2
b Illustrate the IP traffic processing for outbound and inbound packets. 9 2 3 2,3
5
c Explain with neat diagram the key components Internet Mail 9 3 2 2
Architecture.

You might also like