0% found this document useful (0 votes)
41 views5 pages

DPS PYQs

The document outlines the end semester examination for the Data Privacy & Security course at Manipal Institute of Technology, detailing various questions related to encryption methods, digital forensics, and privacy attacks. It includes practical exercises on cryptographic techniques such as Hill Cipher, Playfair Cipher, AES, RSA, and Diffie-Hellman key exchange, as well as discussions on ethical considerations in data handling. The examination assesses students' understanding of security mechanisms and their application in real-world scenarios.

Uploaded by

khushpatel1222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views5 pages

DPS PYQs

The document outlines the end semester examination for the Data Privacy & Security course at Manipal Institute of Technology, detailing various questions related to encryption methods, digital forensics, and privacy attacks. It includes practical exercises on cryptographic techniques such as Hill Cipher, Playfair Cipher, AES, RSA, and Diffie-Hellman key exchange, as well as discussions on ethical considerations in data handling. The examination assesses students' understanding of security mechanisms and their application in real-world scenarios.

Uploaded by

khushpatel1222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Manipal Institute of Technology, Manipal

Department of Data Science and Computer Applications


Subject: DSE 3258 - Data Privacy &Security
End Semester Examination
Class: VI SEM DSE Max. Marks: 50 Date: 01.06.2023

Type: DES

QNo. Questions Mapped BL


COs

CO 1 3
1A Q1. Help Ria toencrypt a message 'safe message" and send to Priya
using Hill Cipher by considering key as "ciphering' (assume the length=3,
A=0). (4)

CO 1 3
1B Q2. Demonstrate a playfair cipher for decrypting the ciphertext
"RBCQVWDQBWETIBYHWQZ" using a key as "kaffee und tee".
(3)

CO 1 3
1C Q3. Fora given plain text "beautiful day", demonstrate single columnar
transposition using "TODAY as the key.
(3)

d4 CO 1 3
2A
bf
Sd
the data l30.
Q4. Perform AES mix column operation on
(5)

Data Encryption Standard, CO 1 2


2B Q5. Explain the role of the Feistel network in the
encryption
and how does it contribute to the overall security of the
scheme? (3)

using RSA. Assume p = 3, CO 2 3


20 Q6. Calculate the ciphertext for plaintext '5'
q=13, e=5. (2)

engaging in fraudulent financial CO 3


3A Q7. A bank suspects that a customer is
investigate. The team
transactions and asks a digital forensics team to
as transaction logs, and
examines the customer's account activity, such
identifies suspicious patterns of behavior, such as
frequent
offshore accounts or large withdrawals from ATMs. The
team
forensic tools and techniques to collect evidence that can
tran
usessfer s
digtalto

prosecute the customer for financial fraud. For


be used to
this case study.
digital forensic examination report. write a
3B Q8. With the help of an example explain Goal-Question-Metric (GOA(5)
approach for building the security metrics. (3)

3C Q9. Discuss impact of the following Privacy


attacks over personal
information CO4
a. ldentity theft
b. Eavesdropping (2)
4A
Q10. Consider an elliptic curve
the prime field GF23.
defined by the equation y² = x +x + 1
Assume a base point G = (13, 7) and a over CO2
=3. Perform the
following operations using the point private key nB
multiplication method addition and
a. Calculate the
public key.
b. Perform the encryption
using the nonce value koperation
of the message PT= (17,
= 3. (5) 20)
4B Q11. Aice and Bob
want to establish a
Hellman key exchange protocol. shared secret key using the
a They agree on a Diffie CO 2
primitive root g=3. Alice prime
chooses a secret integer b=7.chooses a secret integer a=5.number p = 17 and
a.
while Bob
Calculate Alice's public key A.
b.
Calculate Bob's public key B.
C
Determine the shared secret key using the
public keys. (3)
4C 012 SHA-256
(Secure Hash Algorithm
two hashing
algorithms which
256-bit) and Keccak-256 are the
bits output. takes variable length input and CO 2
Assume thata
innut x = "Hello world" and SHA-256 hash operation performedproduces 256
over the
Manipal" are producing the Keccak-256 hash operation over y =
same output. Does it mean "Hello
Keccak-256 are not collision resistant? Justify your SHA-256 and
answer. (2)
2
5A Q13. Explain the diferent levels of access restrictions applied by data C0 4
holders to person-specific data. (4)
CO 4 4
5B Q14. Compare and contrast the working mechanism of null-map, k-map
and wrong-map (3)

CO 4 4
5C Q15. Read the following paragraph and answer the question
data from its patients,
A healthcare provider has collected personal
and insurance
including medical histories, diagnoses, treatments,
pool of data that can be
information. The provider has access to a large
overall healthcare quality.
analysed to imprOve patient outcomes and
and security of patient data,
However, there are concerns about the privacy
unauthorized access.
as well as the potential for misuse or
considerations that the healthcare
What are some of the ethical and legal
patients' personal data for
provider should take into account when using
analysis and research purposes? (3)
Manipal Institute of Technology, Manipal
Department of Data Science and Computer Applications
Subject: DSE 3258 - Data Privacy &Security
Make-up Examination
Max. Marks: 50 Date: 10.07.2023
Class: VISEM DSE

Type: DES

Questions Mapped BL
QNo.
COs

Q1. Explain the various security mechanisms which are incorporated into the CO 1 2
1A
services.
appropriate protocol layer in order to provide some of the OSI security
(4)
beautiful day" as CO 1 2
1B Q2. Explain the steps of play fair cipher by considering "today is a
the plaintext and the key as "kaffee und tee".
(3)

with a key as CO 1 4
1C Q3. Raam has sent an encrypted message as "YKUIPNDOPRPIHP"
"MANIPAL" to Shyam. Raam has advised Shyam to decipher the given cipher
using the Monoalphabetic cipher. Help Shyam to decipher the given cipher by
convincing him of the advantage of the Monoalphabetic cipher over Caesar's
cipher. (3)

Q4. Analyse the various components of the AES algorithm. How do these
CO 1 4
2A
components work together to provide a high level of encryption security?
(5)

2
2B Q5. Explain the working mechanismn of triple-DES encryption technique. CO 1

(3)

Q6. Calculate the private key value for p = 13, q = 17 and public key = 35 using CO 2
3
2C
RSA.
(2)
Q7. "A suspect in a criminal case has been arrested and their mobile device has CO 3 2
3A
been seized. The digital forensics team is tasked with recovering evidence from
the device, such as text messages, call logs, and location data. The team uses
specialized software to extract data from the device and analyse it for relevant
information, such as evidence of communication with accomplices or location data
that places the suspect the scene of a crime". For this case study, write a digital
forensic examination report. (5)

CO 3 2
3 Q8. Explain different scale of the data which can be used to analyse security
metrics. (3)
Q9. Discuss impact of thefollowing Privacy atackS Over personal information
3C
a. Malware attacks
b. Phishing. (2)
Q10. Consider an elliptic curve Ez3 (1, 1) over the prime field GF Assume abase
4A point G=(6, 19) and a private key nB =2. Perforn the encryption operation with
the nonce value k=2 using the point addition and multiplication method (5)

4B Q11. With an example, explain the role of a prime number and a primitive root in

the Diffie-Hellman key exchange protocol. (3)


4C Q12. Discuss the concept of a hash collision and its implications for hash
functions. (2)
5A
Q13. Explain the various disclosure control problems on highly identifiable data ike
personal information such as names, addresses, Social security numbers, and
medical records. (5)
5B Q14. Explain the difficulties of implementing null-map, k-map and
an anonymous data set. (3) wrong-map over

5C Q15. Read the following paragraph and


answer the question
Ahealthcare organization is
exploning the
research purposes. The organ1zation wantsuseto of patients' personal data for
analyse the data to identify pattems,
trends and potential correlations to
improve healthcare outcomes and develop
personalized treatment plans. However,
Ownership, and the ethical mplications ofthere are concerns
using sensitive about privacy, data
ethical personal
considerations and risks associated infometion
Evaluate the
patients' personal data for potential
research purposes in the with the use of
recommendations for mitigating these
risks healthcare industry. Provide
while ensuring
analysis are realized. (2) the
benefits of data

You might also like