FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 7th Sem 2017-2018 NIT 701 Cryptography And Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2017-2018 NIT 701 Cryptography And Network Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Firstranker's choice

Printed pages: 02

Paper Id: 1 0 5 3

--- Content provided by‌ FirstRanker.com ---

FirstRanker.com

Roll No.

B.TECH.

(SEM VII) THEORY EXAMINATION 2017-18

CRYPTOGRAPHY & NETWORK SECURITY

--- Content provided by⁠ FirstRanker.com ---

Total Marks: 100

Time: 3 Hours

Note: 1.

SECTION A

Attempt all questions in brief.

  1. a. Find GCD(1970, 1066) by using Euclid's Algorithm.
  2. --- Content provided by‍ FirstRanker.com ---

  3. b. What are the different factors on which Cryptography depends?
  4. c. Compute the value of 517 mod 11 & 1117 mod 5.
  5. d. Find the value of Euler's Totient Number f(88).
  6. e. What is Cryptanalysis?
  7. f. Discuss Linear and Differential cryptanalysis.
  8. --- Content provided by⁠ FirstRanker.com ---

  9. g. What is Birthday Attack?
  10. h. Discuss Double & Triple DES.
  11. i. Discuss Group & Ring with suitable axioms.
  12. j. What is Security Attack? Discuss its various types.

2 x10 = 20

--- Content provided by‌ FirstRanker.com ---

SECTION B

Attempt any three of the following:

  1. a. How E-Mail security is achieved? Discuss S/MIME with suitable steps & block diagram.
  2. b. Discuss DES in detail with suitable block diagram.
  3. c. Discuss MD-5 Algorithm with all required steps and suitable block diagram.
  4. d. Describe IDEA encryption and decryption in brief. Also explain. How can we generate cryptographically secure pseudorandom numbers?
  5. --- Content provided by‍ FirstRanker.com ---

  6. e. What do you understand by Elgamel encryption system? Explain its encryption and decryption?

10 x 3 = 30

SECTION C

Attempt any one part of the following:

  1. (a) Explain Digital Signature. Discuss signing & verifying process of Digital Signature Algorithm (DSA) in detail with suitable steps.
  2. (b) Discuss X.509 digital certificate format. What is its significance in cryptography?
  3. --- Content provided by​ FirstRanker.com ---

10 x 1 = 10

Attempt any one parts of the following:

  1. (a) Why Message Authentication is required? Discuss working of MAC with suitable block diagram. Also discuss HMAC & CMAC in detail.
  2. (b) What is Hash Function? Discuss SHA-512 with all required steps, round function & block diagram.

10 x 1 = 10

--- Content provided by‍ FirstRanker.com ---

Attempt any one parts of the following:

  1. (a) Discuss Diffie Hellman key exchange method. Let q = 353, a=3, XA= 97 and XB = 233. Then Compute YA, YB, KA& KB using Diffie Hellman.
  2. (b) Discuss Public Key Cryptosystem. Explain RSA algorithm with suitable steps. Let p= 17, q=11, e=7 and d=23. Calculate the public key & private key and show encryption.
  3. (c) What do you understand by Chinese Remainder Theorem? Solve the following congruent equations by Chinese remainder theorem:
    1. X = 2 mod 3
    2. X = 3 mod 5
    3. --- Content provided by‌ FirstRanker.com ---

5 x 2 = 10

Attempt any two part of the following:

  1. (a) Explain Finite field of the form GF (p) & GF (2n ) with suitable example.
  2. (b) What is Block Cipher? Discuss Block Cipher Mode of Operations.
  3. --- Content provided by‍ FirstRanker.com ---

  4. (c) What do you understand by Feistel cipher structure? Explain with suitable block diagram.

5 x 2 = 10

Attempt any one part of the following:

  1. (a) What is Kerberos? Discuss Kerberos version 4 in detail.
  2. (b) Write short note on the following:
    1. SET
    2. --- Content provided by⁠ FirstRanker.com ---

    3. Intrusion Detection
    4. Firewall
    5. AES

10 x 1 = 10

--- Content provided by⁠ FirstRanker.com ---

FirstRanker.com

FirstRanker.com



--- Content provided by FirstRanker.com ---

This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University