0% found this document useful (0 votes)
12 views10 pages

IS Merged

is notes

Uploaded by

painx2143
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
12 views10 pages

IS Merged

is notes

Uploaded by

painx2143
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 10

Enrolment No.

/Seat No_____________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VII (NEW) EXAMINATION – SUMMER 2024
Subject Code:3170720 Date:01-06-2024
Subject Name:Information security
Time:02:30 PM TO 05:00 PM Total Marks:70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS
Q.1 (a) List and explain different types of attacks. 03
(b) Explain Caesar cipher algorithm with the help of example. 04
(c) List and explain different mode of operation used for encryption and 07
decryption.

Q.2 (a) List use of public key cryptography 03


(b) Write steps for sub key generation in DES 04
(c) Explain DES encryption. 07
OR
(c) List and explain possible attacks on DES. 07

Q.3 (a) List requirements of public key cryptography. 03


(b) How same key can be calculated in diffi hellman key exchange 04
algorithm.
(c) Explain key generation of RSA algorithm 07
OR
Q.3 (a) Write Euclid algorithm. 03
(b) Discuss security of diffi hellman key exchange algorithm. 04
(c) Write down the algorithm used for calculation exponentiation 07
efficiently. Also give example.

Q.4 (a) What is authentication? How can we implement message 03


authentication?
(b) List and explain requirements of secure hash function 04
(c) List basic uses of Hash function. 07
OR
Q.4 (a) Define weak collision resistance and strong collision resistance. 03
(b) Draw message digest generation using SHA 512 algorithm. 04
(c) Explain message authentication based on DES. 07
Q.5 (a) Define Mutual authentication with example. 03
(b) How public key cryptography can be used for Digital signature? 04
Explain.
(c) Draw and explain DSS approach for digital signature. 07
OR
Q.5 (a) List and explain various key distribution approach of symmetric key 03
cryptography.
(b) Discuss the security of digital signature. 04
(c) What is replay attack? How can we avoid this attack using digital 07
signature?
************

1
Seat No.: ________ Enrolment No.___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VII (NEW) EXAMINATION – WINTER 2023
Subject Code:3170720 Date:19-12-2023
Subject Name: Information security
Time: 10:30 AM TO 01:00 PM Total Marks:70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
Marks

Q.1 (a) Explain Caesar Cipher technique with Example. 03


(b) Explain with example any two principles of Security. 04
(c) Define the following terms related to Information Security: i. Cryptography ii. 07
Cryptanalysis iii. Sniffing iv. Spoofing v. Interception vi. Fabrication vii.
Masquerade
Q.2 (a) Differentiate between Block Cipher and Stream Cipher. 03
(b) Explain One-Time Pad Substitution technique with the help of example. 04
(c) Explain in detail single round of DES algorithm. 07
OR
(c) Explain in detail single round of AES algorithm. 07

Q.3 (a) What is meet in the middle attack? 03


(b) Explain Electronic Code Book and Cipher Block Chaining Mode in detail. 04
(c) In a Diffie-Hellman Key Exchange, Alice and Bob have chosen prime value q = 07
17 and primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6,
what is the secret key they exchanged? Explain it with proper steps.
OR
Q.3 (a) Define Hash function in Cryptographic and list its application. 03
(b) Differentiate between Symmetric key cryptography and Asymmetric key 04
cryptography.
(c) Explain RSA algorithm with example in detail. 07

Q.4 (a) What is MAC? State the main difference between MAC & Hash function. 03
(b) Explain hill cipher algorithm with example. 04
(c) Explain Message Digest Generation Using SHA-512. 07
OR
Q.4 (a) Explain the types of attacks are addressed by message authentication? 03
(b) What are the requirements for a Cryptographic Hash Function? 04
(c) Explain with the diagrams Basic Uses of Message Authentication code (MAC). 07

Q.5 (a) What is the role of Key Distribution Centre? Give the several techniques for the 03
distribution of public keys.
(b) Give the difference between Session key and Master key. 04
(c) Explain with neat diagram Digital Signature Algorithm. 07
OR

1
Q.5 (a) What is the role of AS and TGS in Kerberos? 03
(b) Draw X.509 certificate format. 04
(c) Explain SSL Architecture with neat diagram. 07

2
Seat No.: ________ Enrolment No.___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE – SEMESTER- VII EXAMINATION-SUMMER 2023
Subject Code: 3170720 Date: 19/06/2023
Subject Name: Information security
Time: 10:30 AM TO 01:00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS

Q.1 (a) Explain following terms: non-repudiation, integrity, masquerade 03


(b) Encrypt the message “attc” with the following key using Hill cipher. 04

(c) Explain playfair cipher. Encrypt the plain-text message “helloe jassmin” using 07
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any
‘j’ in the plaintext is replaced by ‘i’.)

Q.2 (a) Discuss Electronic Code Book mode and Counter mode in detail. 03
(b) Write difference between Block vs Stream Ciphers. Explain following terms 04
in context of cryptography: confusion and diffusion
(c) Explain DES round structure in detail. 07
OR
(c) Write a note on Advanced Encryption Standard(AES). 07

Q.3 (a) Write difference between conventional encryption and public-key encryption 03
(b) Explain man-in-the middle attack on Diffie-Hellman key exchange. 04
(c) Explain RSA algorithm in detail. Perform encryption and decryption using 07
RSA algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
OR
Q.3 (a) Explain following terms: Avalanche Effect, Cryptanalysis 03
(b) Discuss possible approaches to attack RSA. 04
(c) Explain the Deffie Hellman key exchange scheme in detail. In a Diffie- 07
Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and
primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is
the secret key they exchanged?

Q.4 Compare and contrast – MAC VS Encryption functions. In MAC, if 80-bit key
(a) 03
is used and the tag is 32 bits, then after how many rounds attacker will produce
a key, which must be the one used by the sender ?
(b) Explain working of Cipher-based Message Authentication Code and Data 04
Authentication Algorithm.
(c) Explain the working of Secure Hash Algorithm-512 in detail. 07
OR
Q.4 (a) Discuss three applications of hash functions. 03

1
(b) Discuss Hash function and its requirements. 04
(c) Write the algorithm for message authentication code based on HASH 07
functions. Also discuss its efficient implementation approach.

Q.5 Draw X.509 certificate format. Enlist the reasons to revoke the certificate
(a) 03
before expiry.
(b) Explain different ways to distribute symmetric key using symmetric and 04
asymmetric encryptions.
(c) Enlist requirements of Kerberos. Enlist and explain roles of various servers are 07
used in Kerberos. Explain through diagram, how Kerberos can communication
with other administrative domains for providing trusted services to the clients.
OR
Q.5 (a) Explain briefly: Linear and Differential Cryptanalysis 03
(b) Explain various general categories of schemes for the distribution of public 04
keys.
(c) Define Digital signature. Explain digital signature algorithm. 07

*************

2
Seat No.: ________ Enrolment No.___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VII (NEW) EXAMINATION – WINTER 2022
Subject Code:3170720 Date:12-01-2023
Subject Name:Information security
Time:10:30 AM TO 01:00 PM Total Marks:70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS

Q.1 (a) List and explain various types of attacks? 03


(b) What is Hill Cipher? Generate a Cipher text for plain text “hi” using key 04
“jefh” using hill cipher.
(c) List various mode of cryptographic operation. Explain any one with the 07
help of diagram.

Q.2 (a) List advantages of asymmetric cryptography over symmetric key 03


cryptography.
(b) Explain encryption and decryption of RSA algorithm 04
(c) Explain avalanche effect in DES algorithm. 07
OR
(c) Does DES algorithm Secure? Discuss security of DES. 07

Q.3 (a) List the requirements of public key cryptography. 03


(b) List application of RSA algorithm. 04
(c) Discuss security of Diffie Hellman Key exchange algorithm with the help 07
of example.
OR
Q.3 (a) Using diagram explain how RSA algorithm can be used to digitally sign 03
the message.
(b) Compute public key and private key of RSA with p-11, q=17 and e = 7. 04
(c) Compute Inverse of b=550 mod m=1759 using Euclid algorithm 07

Q.4 (a) Explain cryptanalysis attack on cryptographic hash function. 03


(b) Explain pre-image resistance and second pre-image resistance. 04
(c) Write a note on birthday attack. 07
OR
Q.4 (a) What is collision resistance property of hash function? 03
(b) Explain a simple hash function and its limitation. 04
(c) What is block size and message digest size in SHA 512? With the help of 07
diagram explain a round of SHA-512 algorithm

Q.5 (a) Explain mutual authentication using symmetric key cryptography 03


(b) Compare authentication and authorization. 04
(c) Explain Schnorr algorithm for digital signature. 07
OR
Q.5 (a) Explain one way authentication using symmetric key cryptography 03
(b) Compare link encryption and end to end encryption 04
(c) Explain NIST Digital signature algorithm 07
************

1
Seat No.: ________ Enrolment No.___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VII (NEW) EXAMINATION – SUMMER 2022
Subject Code:3170720 Date:10/06/2022
Subject Name:Information security
Time:02:30 PM TO 05:00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS
Q.1 (a) Define the following terms: 03
(i) Security Attack (ii) Security Services (iii) Security Mechanism
(b) Answer following questions. 04
(i) 15 parties want to exchange messages securely using symmetric key
encryption algorithm. The number of distinct key values required
will be_________.
(ii) 15 parties want to exchange messages securely using asymmetric
key encryption algorithm. The number of distinct key values
required will be_________.
(iii) Total number of s-box used in DES is_________.
(iv) How many AES rounds are required for 128-bit key size?
(c) List and explain various types of attacks on encrypted message. 07

Q.2 (a) Encrypt the message “CORONA” using Hill Cipher with key [9 4] 03
5 7
(b) Discuss different techniques for public-key distribution. 04
(c) Elaborate DES encryption with neat sketches. 07
OR
(c) Elaborate AES encryption with neat sketches. 07

Q.3 (a) Discuss Meet-in-the-Middle Attack. 03


(b) Discuss Cipher Block Chaining (CBC) modes of operation with the help 04
of diagram.
(c) What is KDC? With the help of diagram explain how KDC do key 07
distribution.
OR
Q.3 (a) Discuss Man-in-the-Middle Attack. 03
(b) Discuss Cipher Feedback (CFB) block cipher modes of operation with the 04
help of diagram.
(c) Discuss briefly the working of KERBEROS authentication protocol. 07

Q.4 (a) Decipher the message ”KBSTZPEGBWNDGQHWQWC” Using 03


Vigenere cipher with key “confidential”
(b) Explain the following properties of hash function 04
(i) One way property
(ii) Weak collision resistance
(c) P and Q are two prime numbers. P=17, and Q=31. Take public key E=7. 07
If plain text value is 2, then what will be the private key and cipher text
value according to RSA algorithm? Explain in detail.

1
OR

Q.4 (a) Encrypt the message “WE ARE DISCOVERED FLEE AT ONCE” 03
using Rail fence cipher with rail = 3
(b) Explain the triple DES scheme with two keys and write about proposed 04
attacks on 3DES
(c) For Diffie-Hellman algorithm, two publically known numbers are prime 07
number 23 and primitive root (g) of it is 9. A selects the random integer
4 and B selects 3. Compute the public key of A and B. Also compute
common secret key.

Q.5 (a) Define the following terms: 03


(i) Cryptography (ii) Cryptanalysis (iii) Brute-force attack
(b) Discuss SSL protocol stack. 04
(c) Discuss Secure Hash Algorithm (SHA) 07
OR

Q.5 (a) Illustrate variety of ways in which MAC code can be used to provide 03
Message authentication.
(b) Consider ElGamal cryptosystem in Z17 with generator 6. If the message 04
is 13 and the randomness chosen is 10, then find the ciphertext computed
using the public key 7.
(c) Discuss X.509 authentication service. 07

*************

2
Seat No.: ________ Enrolment No.___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VII (NEW) EXAMINATION – WINTER 2021
Subject Code:3170720 Date:29/12/2021
Subject Name:Information security
Time:10:30 AM TO 01:00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS
Q.1 (a) Define the following terms: 03
(i) Non-repudiation (ii) Data integrity (iii) Confidentiality

(b) Distinguish between passive and active security attacks? Define the type 04
of Security attack in each of the following cases:
(i) A student breaks into a professor’s office to obtain a copy of the next
day’s test.
(ii) A student gives a check for $10 to buy a used book. Later she finds
that the check was cashed for $100.
(iii) A student sends hundreds of e-mails per day to another student using
a phony return e-mail address.
(c) List and explain various block cipher modes of operation with the help of 07
diagram.

Q.2 (a) What is the purpose of S-boxes in DES? Explain the avalanche effect. 03
(b) Construct a Playfair matrix with the key “engineering”. And encrypt the 04
message “test this Balloon”.
(c) Let K = 133457799BBCDFF1 be the key in hexadecimal. Derive K1 the 07
first round sub key using a single round version of DES.
Permuted Choice One (PC-1) Permuted Choice Two (PC-2)

57 49 41 33 25 17 9 14 17 11 24 1 5 3 28
1 58 50 42 34 26 18 15 6 21 10 23 19 12 4
10 2 59 51 43 35 27 26 8 16 7 27 20 13 2
19 11 3 60 52 44 36 41 52 31 37 47 55 30 40
63 55 47 39 31 23 15 51 45 33 48 44 49 39 56
7 62 54 46 38 30 22 34 53 46 42 50 36 29 32
14 6 61 53 45 37 29
21 13 5 28 20 12 4

OR

(c) Let M =3243F6A8885A308D313198A2E0370734 be the plain text 07


message and K=2B7E151628AED2A6ABF7158809CF4F3C be the key
in hexadecimal. Perform the following operation using AES.
(a) Add round key.
(b) Shift row transformation on output of (a)

Q.3 (a) What is a nonce? What is the difference between a session key and a 03
master key?
1
(b) Differentiate between hashing and encryption. What are the practical 04
applications of hashing?
(c) Explain Diffie Hellman key exchange algorithm with example. 07

OR

Q.3 (a) What is public key cryptography? What are the principal elements of a 03
public-key cryptosystem?
(b) Perform encryption and decryption using the RSA algorithm for p=5, 04
q=11, e=3, M=9.
(c) What do you mean by key distribution? Give at least one method for key 07
distribution with proper illustration.

Q.4 (a) Explain the triple DES scheme with two keys. 03
(b) Differentiate between Conventional encryption and Public-key 04
encryption.
(c) Discuss X.509 Certificates. 07

OR

Q.4 (a) Why not Double DES? What is a meet-in-the-middle attack? 03


(b) Discuss message digest generation using SHA-512. 04
(c) What is message authentication code? What is the difference between a 07
Message authentication code and a one-way hash function? Write the basic
uses of Message authentication code.

Q.5 (a) Encrypt the message “ Asymmetric key cryptography is fun” using 03
Transposition cipher with key (3,2,6,1,5,4)
(b) Write difference between (i) block cipher and stream cipher (ii) 04
monoalphabetic cipher and polyalphabetic cipher
(c) Discuss generic model of digital signature process. 07

OR

Q.5 (a) Using the Viennese cipher, encrypt the word “explanation” using the key 03
leg.
(b) Discuss four general categories of schemes for the distribution of public 04
keys.
(c) Explain Kerberos in detail. 07

*************

You might also like