Download GTU B.Tech 2020 Winter 7th Sem 2170709 Information And Network Security Question Paper

Download GTU (Gujarat Technological University Ahmedabad) B.Tech/BE (Bachelor of Technology/ Bachelor of Engineering) 2020 Winter 7th Sem 2170709 Information And Network Security Previous Question Paper

Seat No.: ________
Enrolment No.___________
GUJARAT TECHNOLOGICAL UNIVERSITY
BE- SEMESTER?VII (NEW) EXAMINATION ? WINTER 2020
Subject Code:2170709 Date:21/01/2021
Subject Name:Information and Network Security
Time:10:30 AM TO 12:30 PM Total Marks: 56
Instructions:
1. Attempt any FOUR questions out of EIGHT questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.


MARKS
Q.1 (a) Define: Confidentiality, Authenticity and Integrity.
03

(b) Discuss Avalanche effect and Completeness property of a block cipher.
04

(c) Explain Playfair cipher technique in detail. Find cipher text for plain text
07
`GTUINSEXAM' using `STUDY' as key.


Q.2 (a) Compare and contrast symmetric key cryptography and asymmetric key
03
cryptography.

(b) Explain the process of key generation in DES.
04

(c) Draw a detailed block diagram of encryption process in DES. Add
07
appropriate description.




Q.3 (a) Briefly explain Triple DES with two keys.
03

(b) Explain public key cryptosystem with neat diagram.
04

(c) Calculate all the values of RSA assuming two primes p=17 and q=11. Assume
07
other values appropriately.




Q.4 (a) State the differences between chosen plain text and chosen cipher text attack.
03

(b) Write a short note on Man-in-the-middle attack.
04

(c) Calculate all the values for Diffie-Hellman key exchange, consider two
07
primes q=353 and a=3. Assume other values appropriately.



Q.5 (a) Enlist various web security threats. Explain any one.
03

(b) Explain how Birthday attack is carried out.
04

(c) Define message authentication code and its characteristics. Discuss MAC
07
based on any standard block cipher.



Q.6 (a) What are different ways for distribution of public keys?
03

(b) Write a short note on PGP.
04

(c) Justify the characteristics needed for a hash function. Explain Secure Hash
07
Algorithm-1 in brief.
Q.7 (a) What is defined by X.509 certificate? Write the process of authentication in
03
X.509.

(b) What is TGT? Explain its use in Kerberose.
04

(c) Write a detailed note on SSL architecture and protocol.
07



Q.8 (a) How does secure socket layer protocol work?
03
(b) Explain key distribution process using Key Distribution Center (KDC).
04
(c) Explain digital signature schemes Elgamal and Schnorr.
07

*************
1

This post was last modified on 04 March 2021