0% found this document useful (0 votes)
18 views

CNS 2

Uploaded by

arthi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

CNS 2

Uploaded by

arthi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

VI Semester B.Tech.

Degree Examination, NOV/DEC - 2024


(CBCS Scheme)
CRYPTOGRAPHY AND NETWORK SECURITY
Time: 03 Hours Max. Marks: 100
QP/Course Code:22CIPE604A
Instructions: i) Answer Question Q. No. 1 or 2.
ii) Answer any one question from Q. No. 3 and Q. No. 4.
iii) Answer any one question from Q. No. 5 and Q. No. 6.
iv) Answer any one question from Q. No. 7 and Q. No. 8.
v) Answer any one question from Q. No. 9 and Q. No. 1

1 a Describe Playfair cipher and Hill cipher technique [7]


b Explain Transposition techniques with appropriate examples [7]
c Draw the simplified model of symmetric encryption and explain it. [6]
or
2 a Draw block diagram to show broad level steps in DES and also give steps of [8]
one round in DES with another diagram
b Distinguish between [6]
i) Confusion and Diffusion ciphers
ii) Block Ciphers and Stream cipher
c Explain AES Algorithm. [6]

3 a State and Prove Fermat’s theorem. [6]


b Explain RSA Algorithm. Perform encryption and decryption using the RSA [8]
algorithm p=11, q=5, e=3; M=9.
c Describe briefly about the attacks on RSA algorithm [6]
or
4 a Evaluate a Diffie-Hellman key exchange concept for prime number q=71 [8]
and primitive root α = 7
i) if user A has private key XA =5. What is A’s public key YA?
ii) if user B has private key XB =12. What is B’s public key YB?
iii) What is shared key?
b Compare how Diffie-Hellman key exchange algorithm is useful in [8]
evaluating man-in -middle attack concept.
c Differentiate between Conventional and Public Key Encryption [4]

5 a Explain the concept of Digital Signature. [6]


b Explain requirements and security of Hash Functions [8]
c Write a short note on Secure Hash Algorithm [6]
or
6 a Discuss briefly about message authentication functions [6]
b Explain four passes of MD5 message Digest algorithm [6]
c Write the algorithm for message authentication code (MACs) based on Hash [8]
functions

7 a Explain Key distribution scenario, with a neat diagram [8]


b Explain Symmetric key distribution using Asymmetric Encryption [8]
c Write a short note on Public-Key Authority [4]
or
8 a Differentiate between Kerberos version 4 and version 5 [8]
b Write a note on X.509 certificate format and authentication process covered [8]
by X.509
c Write a short note on Publicly Available Directory [4]

9 a Explain Secure Socket Layer Hand Shake Protocol [8]


b Explain in detail about S/MIME Functionality [8]
c Write a short note on intruders? [4]
or
10 a Explain what is a virus. State precautions to prevent virus problems. What are [8]
different phases and types of viruses
b Explain in detail about Password protection [8]
c Differentiate between Signature-Based and Anomaly Detection [4]

This question paper is solely typed and edited by me and the copy of the paper is not stored
in any of the computer memory.

You might also like