Gujarat Technological University

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Seat No.: ________ Enrolment No.

___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER– VII (New) EXAMINATION – WINTER 2019
Subject Code: 2170709 Date: 26/11/2019
Subject Name: Information and Network Security
Time: 10:30 AM TO 01:00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

Q.1 (a) Define following principles of security: 03


1) Confidentiality 2) Integrity 3) Availability
(b) Describe Rail-fence cipher algorithm with example. 04
(c) Explain cryptanalytic attacks with example of any encryption algorithm. 07

Q.2 (a) Explain one time pad algorithm with example and mention its strength and 03
weakness.
(b) What is the difference between a mono alphabetic cipher and a 04
polyalphabetic cipher?
(c) Encrypt the message “GTU Examination” 07
 5 17 
using the Hill cipher algorithm with the key matrix   . Show your
 4 15 
calculations and the result.
OR
(c) Perform encryption in Playfair Cipher algorithm with plain text as 07
“INFORMATION AND NETWORK SECURITY”, Keyword is
“MONARCHY”. (Note: 1.Put j and i both combine as a single field in 5*5
matrix).
Q.3 (a) Explain CFB algorithm mode with diagram. 03
(b) Describe the Diffie Hellman key exchange Algorithm with example. 04
(c) Draw block diagram to show Broad level steps in DES and also give steps 07
of one round in DES with another diagram.
OR
Q.3 (a) Explain Counter (CTR) algorithm mode with diagram. 03
(b) Differentiate block cipher and stream cipher algorithm with example 04
(c) Explain process of encryption in RSA Algorithm with suitable example. 07
(Prime Number P,Q and Encryption Key E is given for reference) P=7,
Q=17, E=7
Q.4 (a) What are the principal elements of a public-key cryptosystem? 03
(b) What is a meet-in-the-middle attack in double DES? 04
(c) Briefly describe Mix Columns and Add Round Key in AES algorithm. 07
OR
Q.4 (a) What is the role of a compression function in a hash function? 03
(b) What is the main difference between HTTP and HTTPS protocol. When 04
HTTPS is used, which elements of the communication are Encrypted?

1
(c) Explain working of Secure Hash Algorithm, with basic arithmetical and 07
logical functions used in SHA.
Q.5 (a) Draw Generic Model of Digital Signature Process. 03
(b) Explain Elgamal Digital Signature Scheme. 04
(c) Describe MAC with its security implications. 07
OR
Q.5 (a) What problem was Kerberos designed to address? 03
(b) Explain Schnorr Digital Signature Scheme. 04
(c) Explain use of Public-Key Certificate with diagram and draw X.509 07
certificate format.

*************

You might also like