Wa0002.

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

DOWNLOADED FROM STUCOR APP

Reg. No. :

Question Paper Code : 40404

B.E./B.Tech. DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2021.

Sixth/Seventh Semester

Computer Science Engineering

CS 8792 – CRYPTOGRAPHY AND NETWORK SECURITY

(Common to B.E. Computer and Communication Engineering/B.E. Electronics and


Communication Engineering/B.E. Electronics and Telecommunication
Engineering/B.Tech. Information Technology)

(Regulations 2017)

Time : Three hours Maximum : 100 marks


Answer ALL questions.

PART A — (10  2 = 20 marks)

1. What is meant by Denial of Service attack? Is it Active Attack or Passive


Attack?

2. Let message = “Anna”, and k = 3, find the ciphertext using Caesar.

3. Find Residues of 6 when n = 8.

4. Find gcd(2740, 1760) using Euclidean Algorithm.

5. Using Fermat’s theorem, check whether 19 is prime or not? Consider a is 7.

6. Find atleast two points lies in the elliptic curve y 2  x 3  2x  3mod 5 .

7. What is meant by padding? And, why padding is required?

8. Draw functional diagram of RSA based Digital Signature.

9. Explain the process of Radix 64 conversion.

10. Write short notes on Spammers and Key loggers.

Refer STUCOR APP for Complete Notes


DOWNLOADED FROM STUCOR APP

PART B — (5  13 = 65 marks)

11. (a) (i) Let message = “graduate”, Key = “word”, find ciphertext using
playfair cipher. (8)
(ii) List out any two di-gram, two tri-gram. Shortly describe the
application of di-gram and tri-gram in cryptography. (5)
Or

(b) Demonstrate encryption and decryption process in hill cipher. Consider


m = “sh” and key = hill”. (4 + 9)

12. (a) (i) Draw the functionality diagram (functionality in one round) of DES
with number of bits in each flow of data. (8)
(ii) Explain the bitwise XOR operation which involved in RC4. (5)

Or

(b) (i) Explain with sample data: Four transformations in AES. (10)

(ii) In finite field arithmetic, x 6  x 4  x 2  x  1  x 7  x  1  ? . (3)

13. (a) (i) Demonstrate the DH key exchange methodology using following key
values : p  11 , g  2 , X A  9 , X B  4 . (7)
(ii) Diffie–Hellman key agreement is not limited to negotiating a key
shared by only two participants. Any number of users can take part
in an agreement by performing iterations of the agreement protocol
and exchanging intermediate, Write the steps and formulas to be
followed for DH key exchange between Alice, Bob, and Carol. (6)

Or

(b) (i) In a public-key system using RSA, you intercept the ciphertext
C = 20 sent to a user whose public key is e = 13, n = 77. What is the
plaintext M? (7)

(ii) In an RSA system, the public key of a given user is e = 65, n = 2881,
What is the private key of this user? (6)

14. (a) Write the steps involved in the Generation of Message Digest. (13)
Or

(b) (i) Discuss the four requirements of Kerberos. (4)

(ii) Shortly describe about the elements of X509 Certificate. (9)

2 40404

Refer STUCOR APP for Complete Notes


DOWNLOADED FROM STUCOR APP

15. (a) Discuss the seven types of MIME content type.

Or
(b) Draw IPSec Authentication Header and write short notes on each
element of the Header.

PART C — (1 × 15 = 15 marks)

16. (a) A Box contains gold coins. If the coins are equally divided among three
friends, two coins are left over, If the coins are equally divided among five
friends, three coins are left over If the coins are equally divided among
seven friends, two coins are left over. If the box holds smallest number of
coins that meets these conditions, how many coins are there? (Hint : Use
Chinese Remainder Theorem).

Or
(b) (i) Alice chooses 173 and 149 as two prime numbers and 3 as public
key in RSA. Check whether the chosen prime numbers are valid or
not? (5)
(ii) Prove that Euler’s Totient value of any prime number (p) is p  1
and the Euler’s Totient value of the non-prime number (n) is
 p  1  q  1 where p  q are prime factor of n. (5)
(iii) Mr. Ram chooses RSA for encryption, and he chooses 3 and 7 are
two prime numbers. He encrypt the given message (message given
in English alphabets) by mapping A = 1, B = 2, C = 3.., Z = 26. Find
atleast two problems in his implementation. (5)

—————————

3 40404

Refer STUCOR APP for Complete Notes


DOWNLOADED FROM STUCOR APP

*X10328* Reg. No. :

Question Paper Code : X10328


B.E./B.Tech. Degree Examinations, November/December 2020
Seventh Semester
Computer Science and Engineering
CS8792 – Cryptography and Network Security
(Common to Information Technology and Computer and Communication
Engineering)
(Regulations 2017)

Time : Three Hours Maximum : 100 Marks

Answer all questions

Part – A (10×2=20 Marks)

1. Compare active and passive attack.

2. Encrypt the plaintext tobeornottobe using the vigenere cipher for the key value
Now.

3. Give the five modes of operation of block cipher.

4. Define field and ring in number theory.

5. Find the GCD of (2740,1760) using Euclid’s Algorithm.

6. For p = 11 and q = 19 and choose d = 17. Apply RSA algorithm where Cipher
message = 80 and thus find the plain text.

7. What is MAC ? Mention the requirement of MAC.

8. State birthday problem.

9. List out the applications of SSL.

10. What do you mean by IP Security policy ?

Refer STUCOR APP for Complete Notes


DOWNLOADED FROM STUCOR APP

X10328 -2- *X10328*

Part – B (5×13=65 Marks)

11. a) i) What is monoalphabetic cipher ? Examine how it differs from Caesar


cipher. (7)
ii) Encrypt the message “this is an exercise” using additive cipher with
key = 20. Ignore the space between words. Decrypt the message to get the
original plaintext. (6)
(or)
b) i) Explain OSI Security Architecture model with neat diagram. (7)
ii) Describe the various security mechanisms. (6)

12. a) i) Demonstrate that the set of polynomials whose coefficients forms a field is
a ring. (5)
ii) For each of the following elements of DES, indicate the comparable element
in AES if available :
a) XOR of subkey material with the input to the function. (4)
b) f function. (4)
(or)
b) What do you mean by AES ? Diagrammatically illustrate the structure of AES
and describe the steps in AES encryption process with example. (13)

13. a) i) With a neat sketch, explain the Elliptic curve cryptography with an
example. (8)
ii) Alice and Bob use the Diffie – Hellman key exchange technique with a
common prime number 11 and a primitive root of 2. If Alice and Bob choose
distinct secret integers as 9 and 3, respectively, then compute the shared
secret key. (5)
(or)
b) State Chinese Remainder theorem and find the value of X for the given set of
congruent equations using Chinese Remainder theorem. (13)
X ≡ l(mod 5)
X ≡ 2(mod 7)
X ≡ 3(mod 9)
X ≡ 4(mod 11)

14. a) Briefly explain the steps of message digest generation in Whirlpool with a
block diagram. (13)
(or)
b) Explain PKI management model and its operations with the help of a
diagram. (13)

Refer STUCOR APP for Complete Notes


DOWNLOADED FROM STUCOR APP

*X10328* -3- X10328

15. a) With the help of a neat diagram, explain wired and wireless TLS
architecture. (13)
(or)
b) Assume when an attacker tries to modify the database content by inserting an
UPDATE statement. Identify this SQL injection attack method and justify.
Detail the methods used to prevent SQL injection attack. (13)

Part – C (1×15=15 Marks)

16. a) Discuss examples from real life, where the following security objectives are
needed :
i) Confidentiality. (5)
ii) Integrity. (5)
iii) Non-repudiation. (5)
Suggest suitable security mechanisms to achieve them.
(or)
b) Consider a banking application that is expected to provide cryptographic
functionalities. Assume that this application is running on top of another
application wherein the end customers can perform a single task of fund
transfer. The application requires cryptographic requirements based on the
amount of transfer.
Transfer amount Cryptography functions required
1 – 2000 Message digest
2001 – 5000 Digital signature
5000 and above Digital signature and encryption
Suggest the security scheme to be adopted in client and server side to
accommodate the above requirements and justify your recommendations. (15)
_________________

Refer STUCOR APP for Complete Notes


Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App

P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's

P
AP
R
O
UC
ST

You might also like