Subject Code: 2170709
GUJARAT TECHNOLOGICAL UNIVERSITY
--- Content provided by FirstRanker.com ---
BE - SEMESTER- VII (New) EXAMINATION — WINTER 2019
Subject Name: Information and Network Security
Time: 10:30 AM TO 01:00 PM
Instructions:
- Attempt all questions.
- Make suitable assumptions wherever necessary.
- Figures to the right indicate full marks.
--- Content provided by FirstRanker.com ---
Q.1
- (a) Define following principles of security:
1) Confidentiality ~ 2) Integrity ~ 3) Availability (03) - (b) Describe Rail-fence cipher algorithm with example. (04)
- (c) Explain cryptanalytic attacks with example of any encryption algorithm. (07)
--- Content provided by FirstRanker.com ---
OR
- (a) Explain one time pad algorithm with example and mention its strength and weakness. (03)
- (b) What is the difference between a mono alphabetic cipher and a polyalphabetic cipher? (04)
- (c) Encrypt the message “GTU Examination” using the Hill cipher algorithm with the key matrix . Show your calculations and the result. (07)
--- Content provided by FirstRanker.com ---
Q.2
- (a) Perform encryption in Playfair Cipher algorithm with plain text as “INFORMATION AND NETWORK SECURITY”, Keyword is “MONARCHY”. (Note: Put j and i both combine as a single field in 5*5 matrix). (03)
- (b) Explain CFB algorithm mode with diagram. (04)
- (c) Describe the Diffie Hellman key exchange Algorithm with example. (07)
--- Content provided by FirstRanker.com ---
OR
- (a) Draw block diagram to show Broad level steps in DES and also give steps of one round in DES with another diagram. (03)
- (b) Explain Counter (CTR) algorithm mode with diagram. (04)
- (c) Differentiate block cipher and stream cipher algorithm with example (07)
Q.3
--- Content provided by FirstRanker.com ---
- (a) Explain process of encryption in RSA Algorithm with suitable example. (Prime Number P,Q and Encryption Key E is given for reference) P=7, Q=17, E=7 (03)
- (b) What are the principal elements of a public-key cryptosystem? (04)
- (c) What is a meet-in-the-middle attack in double DES? (07)
OR
- (a) Briefly describe Mix Columns and Add Round Key in AES algorithm. (03)
- (b) What is the role of a compression function in a hash function? (04)
- (c) What is the main difference between HTTP and HTTPS protocol. When HTTPS is used, which elements of the communication are Encrypted? (07)
--- Content provided by FirstRanker.com ---
Q.4
- (a) Draw Generic Model of Digital Signature Process. (03)
- (b) Explain Elgamal Digital Signature Scheme. (04)
- (c) Describe MAC with its security implications. (07)
--- Content provided by FirstRanker.com ---
OR
- (a) What problem was Kerberos designed to address? (03)
- (b) Explain Schnorr Digital Signature Scheme. (04)
- (c) Explain use of Public-Key Certificate with diagram and draw X.509 certificate format. (07)
--- Content provided by FirstRanker.com ---
Q.5
- (a) Explain the different logical functions used in SHA. (03)
- (b) Explain Schnorr Digital Signature Scheme. (04)
- (c) Explain use of Public-Key Certificate with diagram and draw X.509 certificate format. (07)
Date: 26/11/2019
--- Content provided by FirstRanker.com ---
Total Marks: 70
--- Content provided by FirstRanker.com ---
This download link is referred from the post: GTU BE/B.Tech 2019 Winter Question Papers || Gujarat Technological University