Firstranker's choice
Printed pages: 02
Paper Id: 1 0 5 3
--- Content provided by FirstRanker.com ---
Roll No.
B.TECH.
(SEM VII) THEORY EXAMINATION 2017-18
CRYPTOGRAPHY & NETWORK SECURITY
--- Content provided by FirstRanker.com ---
Total Marks: 100
Time: 3 Hours
Note: 1.
SECTION A
Attempt all questions in brief.
- a. Find GCD(1970, 1066) by using Euclid's Algorithm.
- b. What are the different factors on which Cryptography depends?
- c. Compute the value of 517 mod 11 & 1117 mod 5.
- d. Find the value of Euler's Totient Number f(88).
- e. What is Cryptanalysis?
- f. Discuss Linear and Differential cryptanalysis.
- g. What is Birthday Attack?
- h. Discuss Double & Triple DES.
- i. Discuss Group & Ring with suitable axioms.
- j. What is Security Attack? Discuss its various types.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
2 x10 = 20
--- Content provided by FirstRanker.com ---
SECTION B
Attempt any three of the following:
- a. How E-Mail security is achieved? Discuss S/MIME with suitable steps & block diagram.
- b. Discuss DES in detail with suitable block diagram.
- c. Discuss MD-5 Algorithm with all required steps and suitable block diagram.
- d. Describe IDEA encryption and decryption in brief. Also explain. How can we generate cryptographically secure pseudorandom numbers?
- e. What do you understand by Elgamel encryption system? Explain its encryption and decryption?
--- Content provided by FirstRanker.com ---
10 x 3 = 30
SECTION C
Attempt any one part of the following:
- (a) Explain Digital Signature. Discuss signing & verifying process of Digital Signature Algorithm (DSA) in detail with suitable steps.
- (b) Discuss X.509 digital certificate format. What is its significance in cryptography?
--- Content provided by FirstRanker.com ---
10 x 1 = 10
Attempt any one parts of the following:
- (a) Why Message Authentication is required? Discuss working of MAC with suitable block diagram. Also discuss HMAC & CMAC in detail.
- (b) What is Hash Function? Discuss SHA-512 with all required steps, round function & block diagram.
10 x 1 = 10
--- Content provided by FirstRanker.com ---
Attempt any one parts of the following:
- (a) Discuss Diffie Hellman key exchange method. Let q = 353, a=3, XA= 97 and XB = 233. Then Compute YA, YB, KA& KB using Diffie Hellman.
- (b) Discuss Public Key Cryptosystem. Explain RSA algorithm with suitable steps. Let p= 17, q=11, e=7 and d=23. Calculate the public key & private key and show encryption.
- (c) What do you understand by Chinese Remainder Theorem? Solve the following congruent equations by Chinese remainder theorem:
- X = 2 mod 3
- X = 3 mod 5
--- Content provided by FirstRanker.com ---
5 x 2 = 10
Attempt any two part of the following:
- (a) Explain Finite field of the form GF (p) & GF (2n ) with suitable example.
- (b) What is Block Cipher? Discuss Block Cipher Mode of Operations.
- (c) What do you understand by Feistel cipher structure? Explain with suitable block diagram.
--- Content provided by FirstRanker.com ---
5 x 2 = 10
Attempt any one part of the following:
- (a) What is Kerberos? Discuss Kerberos version 4 in detail.
- (b) Write short note on the following:
- SET
- Intrusion Detection
- Firewall
- AES
--- Content provided by FirstRanker.com ---
10 x 1 = 10
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University