FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU BE/B.Tech 2018 Winter 6th Sem Old 160702 Information Security Question Paper

Download GTU (Gujarat Technological University) BE/BTech (Bachelor of Engineering / Bachelor of Technology) 2018 Winter 6th Sem Old 160702 Information Security Previous Question Paper

This post was last modified on 20 February 2020

GTU BE/B.Tech 2018 Winter Question Papers || Gujarat Technological University


FirstRanker.com
Enrolment No.
GUJARAT TECHNOLOGICAL UNIVERSITY

--- Content provided by FirstRanker.com ---

BE - SEMESTER-VI (OLD) EXAMINATION - WINTER 2018
Subject Code:160702 Date: 04/12/2018
Subject Name: Information Security
Time: 02:30 PM TO 05:00 PM Total Marks: 70
Instructions:

--- Content provided by‍ FirstRanker.com ---

  1. Attempt all questions.
  2. Make suitable assumptions wherever necessary.
  3. Figures to the right indicate full marks.
Q.1 (a) Explain data confidentiality, data authentication and non-repudiation 07
(b) What is cryptography? Briefly explain the model of Asymmetric Cryptosystem 07

--- Content provided by FirstRanker.com ---

Q.2 (a) Explain monoalphabetic cipher and polyalphabetic cipher by giving an example. 07
(b) List various modes of operations of block cipher. Explain any three of them 07
OR
(b) What is the purpose of S-box in DES? Explain the avalanche effect in DES. 07
Q.3 (a) What is the limitation of Electronic Codebook Mode (ECB)? explain CBC mode in detail. 07

--- Content provided by‍ FirstRanker.com ---

(b) Explain public-key cryptosystem in detail. 07
OR
(a) Explain Rail fence Cipher technique. 07
(b) Describe MD5 message digest algorithm. 07
Q.4 (a) What is message authentication code? What are the requirements for MACs? 07

--- Content provided by FirstRanker.com ---

(b) Briefly explain Diffie-Hellman key exchange. Is it vulnerable to man in the middle attack? Justify. 07
OR
(a) What characteristics are needed in secure hash function? Explain the concept of simple hash function. 07
(b) What is authentication? How it can be done using cryptography? 07
Q.5 (a) Explain the general format of PGP(Pretty Good Privacy) message 07

--- Content provided by‍ FirstRanker.com ---

(b) What are the requirements of digital signature? Explain the concept of arbitrated digital signature. 07
OR
(a) Explain SSL architecture. 07
(b) What problem was Kerberos designed to address? Briefly explain how session key is distributed in Kerberos. 07

--- Content provided by⁠ FirstRanker.com ---

FirstRanker.com

This download link is referred from the post: GTU BE/B.Tech 2018 Winter Question Papers || Gujarat Technological University

--- Content provided by⁠ FirstRanker.com ---