DPS PYQs
DPS PYQs
Type: DES
CO 1 3
1A Q1. Help Ria toencrypt a message 'safe message" and send to Priya
using Hill Cipher by considering key as "ciphering' (assume the length=3,
A=0). (4)
CO 1 3
1B Q2. Demonstrate a playfair cipher for decrypting the ciphertext
"RBCQVWDQBWETIBYHWQZ" using a key as "kaffee und tee".
(3)
CO 1 3
1C Q3. Fora given plain text "beautiful day", demonstrate single columnar
transposition using "TODAY as the key.
(3)
d4 CO 1 3
2A
bf
Sd
the data l30.
Q4. Perform AES mix column operation on
(5)
CO 4 4
5C Q15. Read the following paragraph and answer the question
data from its patients,
A healthcare provider has collected personal
and insurance
including medical histories, diagnoses, treatments,
pool of data that can be
information. The provider has access to a large
overall healthcare quality.
analysed to imprOve patient outcomes and
and security of patient data,
However, there are concerns about the privacy
unauthorized access.
as well as the potential for misuse or
considerations that the healthcare
What are some of the ethical and legal
patients' personal data for
provider should take into account when using
analysis and research purposes? (3)
Manipal Institute of Technology, Manipal
Department of Data Science and Computer Applications
Subject: DSE 3258 - Data Privacy &Security
Make-up Examination
Max. Marks: 50 Date: 10.07.2023
Class: VISEM DSE
Type: DES
Questions Mapped BL
QNo.
COs
Q1. Explain the various security mechanisms which are incorporated into the CO 1 2
1A
services.
appropriate protocol layer in order to provide some of the OSI security
(4)
beautiful day" as CO 1 2
1B Q2. Explain the steps of play fair cipher by considering "today is a
the plaintext and the key as "kaffee und tee".
(3)
with a key as CO 1 4
1C Q3. Raam has sent an encrypted message as "YKUIPNDOPRPIHP"
"MANIPAL" to Shyam. Raam has advised Shyam to decipher the given cipher
using the Monoalphabetic cipher. Help Shyam to decipher the given cipher by
convincing him of the advantage of the Monoalphabetic cipher over Caesar's
cipher. (3)
Q4. Analyse the various components of the AES algorithm. How do these
CO 1 4
2A
components work together to provide a high level of encryption security?
(5)
2
2B Q5. Explain the working mechanismn of triple-DES encryption technique. CO 1
(3)
Q6. Calculate the private key value for p = 13, q = 17 and public key = 35 using CO 2
3
2C
RSA.
(2)
Q7. "A suspect in a criminal case has been arrested and their mobile device has CO 3 2
3A
been seized. The digital forensics team is tasked with recovering evidence from
the device, such as text messages, call logs, and location data. The team uses
specialized software to extract data from the device and analyse it for relevant
information, such as evidence of communication with accomplices or location data
that places the suspect the scene of a crime". For this case study, write a digital
forensic examination report. (5)
CO 3 2
3 Q8. Explain different scale of the data which can be used to analyse security
metrics. (3)
Q9. Discuss impact of thefollowing Privacy atackS Over personal information
3C
a. Malware attacks
b. Phishing. (2)
Q10. Consider an elliptic curve Ez3 (1, 1) over the prime field GF Assume abase
4A point G=(6, 19) and a private key nB =2. Perforn the encryption operation with
the nonce value k=2 using the point addition and multiplication method (5)
4B Q11. With an example, explain the role of a prime number and a primitive root in