Download GTU B.Tech 2020 Summer 8th Sem 2170709 Information And Network Security Question Paper

Download GTU (Gujarat Technological University Ahmedabad) B.Tech/BE (Bachelor of Technology/ Bachelor of Engineering) 2020 Summer 8th Sem 2170709 Information And Network Security Previous Question Paper

Seat No.: ________
Enrolment No.___________
GUJARAT TECHNOLOGICAL UNIVERSITY
BE - SEMESTER? VIII EXAMINATION ? SUMMER 2020
Subject Code: 2170709 Date:27/10/2020
Subject Name: Information and Network Security
Time: 10:30 AM TO 01:00 PM Total Marks: 70
Instructions:
1. Attempt all questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.
MARKS
Q.1 (a) Define the terms: Confidentiality, Data integrity, Non-repudiation
03
(b) Construct a Playfair matrix with the key "engineering". And encrypt the message
04
"impossible".
(c) Define Cryptography and Cryptanalysis. Draw and explain conventional
07
cryptosystem.


Q.2 (a) Write the differences between conventional encryption and public key encryption.
03
(b) Write a note on Hill Cipher.
04
(c) Explain the key generation in DES algorithm.
07
OR
(c) Explain the key generation in AES algorithm.
07
Q.3 (a) What is the purpose of the S-boxes in DES? Explain the avalanche effect.
03
(b) Explain Cipher Block Chaining (CBC) and Electronic Code Book (ECB) block
04
cipher modes of operation with the help of diagram.
(c) Explain X.509 authentication service.
07
OR
Q.3 (a) What is the difference between a session key and a master key?
03
(b) Explain Cipher Feedback (CFB) and Output Feedback mode (OFB) block cipher
04
modes of operation with the help of diagram.
(c) Explain authentication mechanism of Kerberos.
07
Q.4 (a) What characteristics are needed in a secure hash function?
03
(b) In a public key system using RSA, the cipher text intercepted is C=10 which is sent
04
to the user whose public key is e=5, n=35. What is the plaintext M?
(c) What do you mean by key distribution? Give at least one method for key
07
distribution with proper illustration.
OR
Q.4 (a) What is the purpose of the State array? How many bytes in State are affected by
03
ShiftRows?
(b) Is message authentication code same as encryption? How message authentication
04
can be done by message authentication code?
(c) Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle
07
attack? Justify.
Q.5 (a) Using the Vigen?re cipher, encrypt the word "ATTACKATDAWN" using the key
03
"LEMON".
(b) Write a note on HTTPS.
04
(c) Write a short note on "Digital Signature Algorithm".
07
OR
Q.5 (a) Explain basic Hash code generation.
03
(b) How public keys can be distributed.
04
(c) Explain SSL architecture.
07

*************

This post was last modified on 04 March 2021