0% found this document useful (0 votes)
4 views3 pages

CNS_ESE_QP2

This document is an examination paper for the B. Tech. VI Semester in Cryptography and Network Security at Kakatiya Institute of Technology & Science. It includes various questions covering topics such as encryption methods, digital signatures, RSA algorithm, and security protocols. The exam consists of multiple sections with theoretical and practical problems to assess students' understanding of cryptographic concepts.

Uploaded by

dasari Sathwika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

CNS_ESE_QP2

This document is an examination paper for the B. Tech. VI Semester in Cryptography and Network Security at Kakatiya Institute of Technology & Science. It includes various questions covering topics such as encryption methods, digital signatures, RSA algorithm, and security protocols. The exam consists of multiple sections with theoretical and practical problems to assess students' understanding of cryptographic concepts.

Uploaded by

dasari Sathwika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

18BT764/2

URR-18 Write your Roll number

KAKATIYA INSTITUTE OF TECHNOLOGY & SCIENCE, WARANGAL


(An Autonomous Institute under Kakatiya University, Warangal)
FACULTY OF ENGINEERING AND TECHNOLOGY
B. Tech. VI Semester (Regular & Supplementary) Examination, May 2022
U18CN604/U18IT604: Cryptography and Network Security
(Common to IT, CSN)
Duration: 3 Hours] [Max. Marks : 60
Note: Answer all the questions.
CDLL CO’s
1.Brua. Do you agree with the statement that an increase in key size of 1 bit doubles [1] U CO1
the security of DES? Justify your answer.

b. Zigzag cipher is a transposition cipher that jumbles up the order of the [1] Ap CO1
letters of a message using a basic algorithm. Convert the Given Plaintext
“CRYPTOGRAPHY” into ciphertext using Rail fence with two rails
technique.
c. Calculate the encryption and decryption for the following plaintext [1] Ap CO1
P=”MEET ME” by using caser cipher with Key k = 3?
d. Fermat’s Theorem: If ‘p’ is a prime number and ‘a’ is a integer number not [1] Ap CO2
divisible by ‘p’ then ap-1 congruent to 1(modp). Prove Fermat’s theorem
holds true for prime number 13 and integer 11.
e. In an RSA system, the public key of a given user is e=31, n=3599. [1] Ap CO2
What is the private key of the user?
f. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers. [1] Ap CO2
Calculate 2P if P = (4, 3.464)?
g. Consider that B wants to send a message m that is digitally signed to A. [1] An CO3
Let the pair of private and public keys for A and B be denoted by K-x and
K+x for x=A,B respectively. Let Kx(m) represent the operation of encrypting
m with a key Kx and H(m) represents the message digest. Examine and
find the Correct way of sending the message ‘m’ along with the digital
signature to A?
h. The input is viewed as a sequence of n-bit blocks. The input is processed [1] Ap CO3
one block at a time in an iterative fashion to produce an n-bit hash value.
Apply first simple hash function to find the output hash value for the
following message blocks.

01001011, 01001101, 10111011, 11110000, 11011100, 10110101


i. X.509 Authentication Service is a digital certificate and needs a Certificate [1] U CO3
Authority (CA’s) to maintain & provides easy way to access public keys.
Identify the notations from the following standard digital certificate.

CA<<A>>=CA{V,SN,AI,CA,UCA,A,UA,AP}
j. Analyze, why the Change Cipher Spec Protocol is separated rather than [1] An CO4
including a change cipher spec message in the Handshake Protocol in SSL
and TLS?
k. Distinguish between transport mode and tunnel mode in IP sec? [1] An CO4
l. What are the limitations of firewalls? [1] R CO4

Page 1 of 3
18BT764/2
2. a. Consider a desktop publishing system used to produce documents for [6] U CO1
various organizations.

i). Give an example of a type of publication for which confidentiality of the


stored data is the most important requirement.
ii). Give an example of a type of publication in which data integrity is the
most important requirement.
iii). Give an example in which system availability is the most important
requirement.
b. Consider the following: [6] Ap CO1
Plaintext: “PROTOCOL”
Secret key: “NETWORK”

What is the corresponding ciphertext using play fair cipher method?


(OR)
c. The AES key expansion algorithm takes as input a 4-word key and [6] U CO1
produces a linear array of 44 words. Write a pseudo code for generating
the expanded key from the actual key.
d. This problem provides a numerical example of encryption using a one [6] Ap CO1
round version of DES .we start with the same bit pattern for the key K and
the plaintext ,namely :
In hexa decimal notation: 0 1 2 3 4 5 6 7 8 9 A B C D E F
In binary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

i. Derive K1. The first round Sub key.


ii. Derive L0,R0
iii. Expand R0 to get E[R0],Where expansion function (E-table)
iv. Calculate A= E[R0] ⊕ K1
v. Group the 48-bit result of (d) into sets of 6 bits and evaluate the
corresponding S-box substitutions.

3. a. RSA algorithm is an asymmetric cryptography algorithm which means, [6] Ap CO2


there should be two keys involve while communicating, i.e., public key
and private key in public key cryptography. Perform encryption and
decryption using RSA algorithm for the following:
p = 7; q = 11, e = 17; M = 8 p = 11; q = 13, e = 11; M = 7.
b. The Diffie–Hellman(DH) Algorithm is a key-exchange protocol that [6] Ap CO2
enables two parties communicating over public channel to establish a
mutual secret without it being transmitted over the Internet.
Consider a Diffie-Hellman scheme with a common prime q = 11 and a
primitive root a = 2.

i. Show that 2 is a primitive root of 11.


ii. If user A has public key YA = 9, find what is A’s private key XA?
iii. If user B has public key YB = 3, find what is the secret key K shared
with A?
iv. How man in middle attack can be performed in Diffie Hellman
Algorithm.
(OR)

Page 2 of 3
18BT764/2
c. The Euclidean algorithm is a way to find the greatest common divisor of [6] Ap CO2
two positive integers, a and b for a −1 modulo n and find multiplicative
inverse for the following.

i. Find the multiplicative inverse of 11 modulo 29.


ii. Find the multiplicative inverse of 37 modulo 53.
iii. Find the multiplicative inverse of 35 modulo 59

d. One elliptic curve encryption/decryption is to be performed over Z11. The [6] Ap CO2
Cryptosystem parameters are E11(1, 6) and the base point G=(2, 7).
Party B's secret key is nB = 7.

i. Find B's public key PB.


ii. If Party A wishes to encrypt the message Pm = (10,9) and chooses the
random value k = 3, determine the ciphertext Cm.

4. a. List and explain the PGP services and explain how PGP message [6] U CO3
generation is done with a neat diagram.
b. Secure Hash Algorithm 512, is a hashing algorithm used to convert text of [6] Ap CO3
any length into a fixed-size string. Each output produces a SHA-512 length
of 512 bits (64 bytes). Consider the Input message: “abc” and Create a 16
word message schedule (W0 to W15) of input sequence for SHA512
Processing of Single Block.
(OR)
c. List the main features of SHA-512 cryptographic hash function. What kind [6] U CO3
of compression function is used in SHA-512?
d. Analyze the Cryptographic algorithms used in S/MIME and Explain [6] An CO3
S/MIME certification processing.

5. a. Is it possible in SSL for the receiver to recorder SSL record blocks that [6] U CO4
arrive out of order? If so, explain how it can be done. If not, why not?
b. Consider the following fragment in an authentication program: [6] An CO4
username = read_username();
password = read_password();
if username is "133t h4ck0r"
return ALLOW_LOGIN;
if username and password are valid
return ALLOW_LOGIN
else return DENY_LOGIN

What type of malicious software is this?


(OR)
c. Illustrate the characteristics of a good firewall implementation? How is [6] U CO4
circuit gateway different from application gateway?
d. Distinguish between Transport mode and tunnel mode? How is [6] An CO4
Encapsulating security payload implemented in these two modes?

---Question Paper Ends---

Page 3 of 3

You might also like