FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU B.Tech 2020 Winter 7th Sem 2170709 Information And Network Security Question Paper

Download GTU (Gujarat Technological University Ahmedabad) B.Tech/BE (Bachelor of Technology/ Bachelor of Engineering) 2020 Winter 7th Sem 2170709 Information And Network Security Previous Question Paper

This post was last modified on 04 March 2021

GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University


FirstRanker.com

Subject Code: 2170709

GUJARAT TECHNOLOGICAL UNIVERSITY

--- Content provided by‍ FirstRanker.com ---

BE- SEMESTER-VII (NEW) EXAMINATION - WINTER 2020

Subject Name: Information and Network Security

Time: 10:30 AM TO 12:30 PM

Instructions:

  1. Attempt any FOUR questions out of EIGHT questions.
  2. --- Content provided by‌ FirstRanker.com ---

  3. Make suitable assumptions wherever necessary.
  4. Figures to the right indicate full marks.
    1. Define: Confidentiality, Authenticity and Integrity. [03]
    2. Discuss Avalanche effect and Completeness property of a block cipher. [04]
    3. Explain Playfair cipher technique in detail. Find cipher text for plain text ‘GTUINSEXAM’ using ‘STUDY” as key. [07]
    4. --- Content provided by​ FirstRanker.com ---

    1. Compare and contrast symmetric key cryptography and asymmetric key cryptography. [03]
    2. Explain the process of key generation in DES. [04]
    3. Draw a detailed block diagram of encryption process in DES. Add appropriate description. [07]
  1. --- Content provided by FirstRanker.com ---

    1. Briefly explain Triple DES with two keys. [03]
    2. Explain public key cryptosystem with neat diagram. [04]
    3. Calculate all the values of RSA assuming two primes p=17 and q=11. Assume other values appropriately. [07]
    1. State the differences between chosen plain text and chosen cipher text attack. [03]
    2. --- Content provided by​ FirstRanker.com ---

    3. Write a short note on Man-in-the-middle attack. [04]
    4. Calculate all the values for Diffie-Hellman key exchange, consider two primes q=353 and a=3. Assume other values appropriately. [07]
    1. Enlist various web security threats. Explain any one. [03]
    2. Explain how Birthday attack is carried out. [04]
    3. --- Content provided by‌ FirstRanker.com ---

    4. Define message authentication code and its characteristics. Discuss MAC based on any standard block cipher. [07]
    1. What are different ways for distribution of public keys? [03]
    2. Write a short note on PGP. [04]
    3. Justify the characteristics needed for a hash function. Explain Secure Hash Algorithm-1 in brief. [07]
    4. --- Content provided by⁠ FirstRanker.com ---

    1. What is defined by X.509 certificate? Write the process of authentication in X.509. [03]
    2. What is TGT? Explain its use in Kerberos. [04]
    3. Write a detailed note on SSL architecture and protocol. [07]
  2. --- Content provided by‌ FirstRanker.com ---

    1. How does secure socket layer protocol work? [03]
    2. Explain key distribution process using Key Distribution Center (KDC). [04]
    3. Explain digital signature schemes Elgamal and Schnorr. [07]

FirstRanker.com

--- Content provided by‍ FirstRanker.com ---

Date: 21/01/2021

Total Marks: 56



--- Content provided by FirstRanker.com ---

This download link is referred from the post: GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University