Wa0002.
Wa0002.
Wa0002.
Reg. No. :
Sixth/Seventh Semester
(Regulations 2017)
PART B — (5 13 = 65 marks)
11. (a) (i) Let message = “graduate”, Key = “word”, find ciphertext using
playfair cipher. (8)
(ii) List out any two di-gram, two tri-gram. Shortly describe the
application of di-gram and tri-gram in cryptography. (5)
Or
12. (a) (i) Draw the functionality diagram (functionality in one round) of DES
with number of bits in each flow of data. (8)
(ii) Explain the bitwise XOR operation which involved in RC4. (5)
Or
(b) (i) Explain with sample data: Four transformations in AES. (10)
13. (a) (i) Demonstrate the DH key exchange methodology using following key
values : p 11 , g 2 , X A 9 , X B 4 . (7)
(ii) Diffie–Hellman key agreement is not limited to negotiating a key
shared by only two participants. Any number of users can take part
in an agreement by performing iterations of the agreement protocol
and exchanging intermediate, Write the steps and formulas to be
followed for DH key exchange between Alice, Bob, and Carol. (6)
Or
(b) (i) In a public-key system using RSA, you intercept the ciphertext
C = 20 sent to a user whose public key is e = 13, n = 77. What is the
plaintext M? (7)
(ii) In an RSA system, the public key of a given user is e = 65, n = 2881,
What is the private key of this user? (6)
14. (a) Write the steps involved in the Generation of Message Digest. (13)
Or
2 40404
Or
(b) Draw IPSec Authentication Header and write short notes on each
element of the Header.
PART C — (1 × 15 = 15 marks)
16. (a) A Box contains gold coins. If the coins are equally divided among three
friends, two coins are left over, If the coins are equally divided among five
friends, three coins are left over If the coins are equally divided among
seven friends, two coins are left over. If the box holds smallest number of
coins that meets these conditions, how many coins are there? (Hint : Use
Chinese Remainder Theorem).
Or
(b) (i) Alice chooses 173 and 149 as two prime numbers and 3 as public
key in RSA. Check whether the chosen prime numbers are valid or
not? (5)
(ii) Prove that Euler’s Totient value of any prime number (p) is p 1
and the Euler’s Totient value of the non-prime number (n) is
p 1 q 1 where p q are prime factor of n. (5)
(iii) Mr. Ram chooses RSA for encryption, and he chooses 3 and 7 are
two prime numbers. He encrypt the given message (message given
in English alphabets) by mapping A = 1, B = 2, C = 3.., Z = 26. Find
atleast two problems in his implementation. (5)
—————————
3 40404
2. Encrypt the plaintext tobeornottobe using the vigenere cipher for the key value
Now.
6. For p = 11 and q = 19 and choose d = 17. Apply RSA algorithm where Cipher
message = 80 and thus find the plain text.
12. a) i) Demonstrate that the set of polynomials whose coefficients forms a field is
a ring. (5)
ii) For each of the following elements of DES, indicate the comparable element
in AES if available :
a) XOR of subkey material with the input to the function. (4)
b) f function. (4)
(or)
b) What do you mean by AES ? Diagrammatically illustrate the structure of AES
and describe the steps in AES encryption process with example. (13)
13. a) i) With a neat sketch, explain the Elliptic curve cryptography with an
example. (8)
ii) Alice and Bob use the Diffie – Hellman key exchange technique with a
common prime number 11 and a primitive root of 2. If Alice and Bob choose
distinct secret integers as 9 and 3, respectively, then compute the shared
secret key. (5)
(or)
b) State Chinese Remainder theorem and find the value of X for the given set of
congruent equations using Chinese Remainder theorem. (13)
X ≡ l(mod 5)
X ≡ 2(mod 7)
X ≡ 3(mod 9)
X ≡ 4(mod 11)
14. a) Briefly explain the steps of message digest generation in Whirlpool with a
block diagram. (13)
(or)
b) Explain PKI management model and its operations with the help of a
diagram. (13)
15. a) With the help of a neat diagram, explain wired and wireless TLS
architecture. (13)
(or)
b) Assume when an attacker tries to modify the database content by inserting an
UPDATE statement. Identify this SQL injection attack method and justify.
Detail the methods used to prevent SQL injection attack. (13)
16. a) Discuss examples from real life, where the following security objectives are
needed :
i) Confidentiality. (5)
ii) Integrity. (5)
iii) Non-repudiation. (5)
Suggest suitable security mechanisms to achieve them.
(or)
b) Consider a banking application that is expected to provide cryptographic
functionalities. Assume that this application is running on top of another
application wherein the end customers can perform a single task of fund
transfer. The application requires cryptographic requirements based on the
amount of transfer.
Transfer amount Cryptography functions required
1 – 2000 Message digest
2001 – 5000 Digital signature
5000 and above Digital signature and encryption
Suggest the security scheme to be adopted in client and server side to
accommodate the above requirements and justify your recommendations. (15)
_________________
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST
Access 3,000+ Study Materials for Semester Exams via STUCOR App
P
AP
R
O
UC
ST
Download STUCOR App for all subject Notes & QP's
P
AP
R
O
UC
ST