We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
VI Semester B.Tech.
Degree Examination, NOV/DEC - 2024
(CBCS Scheme) CRYPTOGRAPHY AND NETWORK SECURITY Time: 03 Hours Max. Marks: 100 QP/Course Code:22CIPE604A Instructions: i) Answer Question Q. No. 1 or 2. ii) Answer any one question from Q. No. 3 and Q. No. 4. iii) Answer any one question from Q. No. 5 and Q. No. 6. iv) Answer any one question from Q. No. 7 and Q. No. 8. v) Answer any one question from Q. No. 9 and Q. No. 1
1 a Describe Playfair cipher and Hill cipher technique [7]
b Explain Transposition techniques with appropriate examples [7] c Draw the simplified model of symmetric encryption and explain it. [6] or 2 a Draw block diagram to show broad level steps in DES and also give steps of [8] one round in DES with another diagram b Distinguish between [6] i) Confusion and Diffusion ciphers ii) Block Ciphers and Stream cipher c Explain AES Algorithm. [6]
3 a State and Prove Fermat’s theorem. [6]
b Explain RSA Algorithm. Perform encryption and decryption using the RSA [8] algorithm p=11, q=5, e=3; M=9. c Describe briefly about the attacks on RSA algorithm [6] or 4 a Evaluate a Diffie-Hellman key exchange concept for prime number q=71 [8] and primitive root α = 7 i) if user A has private key XA =5. What is A’s public key YA? ii) if user B has private key XB =12. What is B’s public key YB? iii) What is shared key? b Compare how Diffie-Hellman key exchange algorithm is useful in [8] evaluating man-in -middle attack concept. c Differentiate between Conventional and Public Key Encryption [4]
5 a Explain the concept of Digital Signature. [6]
b Explain requirements and security of Hash Functions [8] c Write a short note on Secure Hash Algorithm [6] or 6 a Discuss briefly about message authentication functions [6] b Explain four passes of MD5 message Digest algorithm [6] c Write the algorithm for message authentication code (MACs) based on Hash [8] functions
7 a Explain Key distribution scenario, with a neat diagram [8]
b Explain Symmetric key distribution using Asymmetric Encryption [8] c Write a short note on Public-Key Authority [4] or 8 a Differentiate between Kerberos version 4 and version 5 [8] b Write a note on X.509 certificate format and authentication process covered [8] by X.509 c Write a short note on Publicly Available Directory [4]
9 a Explain Secure Socket Layer Hand Shake Protocol [8]
b Explain in detail about S/MIME Functionality [8] c Write a short note on intruders? [4] or 10 a Explain what is a virus. State precautions to prevent virus problems. What are [8] different phases and types of viruses b Explain in detail about Password protection [8] c Differentiate between Signature-Based and Anomaly Detection [4]
This question paper is solely typed and edited by me and the copy of the paper is not stored in any of the computer memory.