FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Get the Nursing Question Bank Android App

Access 10+ years of Question Papers with answers, notes for B.Sc Nursing on the go!

Install From Play Store

Download AKTU B-Tech 7th Sem 2017-2018 NIT 701 Cryptography And Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2017-2018 NIT 701 Cryptography And Network Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Firstranker's choice

Printed pages: 02

Paper Id: 1 0 5 3

--- Content provided by FirstRanker.com ---

FirstRanker.com

Roll No.

B.TECH.

(SEM VII) THEORY EXAMINATION 2017-18

CRYPTOGRAPHY & NETWORK SECURITY

--- Content provided by⁠ FirstRanker.com ---

Total Marks: 100

Time: 3 Hours

Note: 1.

SECTION A

Attempt all questions in brief.

  1. a. Find GCD(1970, 1066) by using Euclid's Algorithm.
  2. --- Content provided by​ FirstRanker.com ---

  3. b. What are the different factors on which Cryptography depends?
  4. c. Compute the value of 517 mod 11 & 1117 mod 5.
  5. d. Find the value of Euler's Totient Number f(88).
  6. e. What is Cryptanalysis?
  7. f. Discuss Linear and Differential cryptanalysis.
  8. --- Content provided by FirstRanker.com ---

  9. g. What is Birthday Attack?
  10. h. Discuss Double & Triple DES.
  11. i. Discuss Group & Ring with suitable axioms.
  12. j. What is Security Attack? Discuss its various types.

2 x10 = 20

--- Content provided by​ FirstRanker.com ---

SECTION B

Attempt any three of the following:

  1. a. How E-Mail security is achieved? Discuss S/MIME with suitable steps & block diagram.
  2. b. Discuss DES in detail with suitable block diagram.
  3. c. Discuss MD-5 Algorithm with all required steps and suitable block diagram.
  4. d. Describe IDEA encryption and decryption in brief. Also explain. How can we generate cryptographically secure pseudorandom numbers?
  5. --- Content provided by FirstRanker.com ---

  6. e. What do you understand by Elgamel encryption system? Explain its encryption and decryption?

10 x 3 = 30

SECTION C

Attempt any one part of the following:

  1. (a) Explain Digital Signature. Discuss signing & verifying process of Digital Signature Algorithm (DSA) in detail with suitable steps.
  2. (b) Discuss X.509 digital certificate format. What is its significance in cryptography?
  3. --- Content provided by FirstRanker.com ---

10 x 1 = 10

Attempt any one parts of the following:

  1. (a) Why Message Authentication is required? Discuss working of MAC with suitable block diagram. Also discuss HMAC & CMAC in detail.
  2. (b) What is Hash Function? Discuss SHA-512 with all required steps, round function & block diagram.

10 x 1 = 10

--- Content provided by​ FirstRanker.com ---

Attempt any one parts of the following:

  1. (a) Discuss Diffie Hellman key exchange method. Let q = 353, a=3, XA= 97 and XB = 233. Then Compute YA, YB, KA& KB using Diffie Hellman.
  2. (b) Discuss Public Key Cryptosystem. Explain RSA algorithm with suitable steps. Let p= 17, q=11, e=7 and d=23. Calculate the public key & private key and show encryption.
  3. (c) What do you understand by Chinese Remainder Theorem? Solve the following congruent equations by Chinese remainder theorem:
    1. X = 2 mod 3
    2. X = 3 mod 5
    3. --- Content provided by FirstRanker.com ---

5 x 2 = 10

Attempt any two part of the following:

  1. (a) Explain Finite field of the form GF (p) & GF (2n ) with suitable example.
  2. (b) What is Block Cipher? Discuss Block Cipher Mode of Operations.
  3. --- Content provided by‌ FirstRanker.com ---

  4. (c) What do you understand by Feistel cipher structure? Explain with suitable block diagram.

5 x 2 = 10

Attempt any one part of the following:

  1. (a) What is Kerberos? Discuss Kerberos version 4 in detail.
  2. (b) Write short note on the following:
    1. SET
    2. --- Content provided by‍ FirstRanker.com ---

    3. Intrusion Detection
    4. Firewall
    5. AES

10 x 1 = 10

--- Content provided by⁠ FirstRanker.com ---

FirstRanker.com

FirstRanker.com



--- Content provided by FirstRanker.com ---

This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University