Download AKTU B-Tech 7th Sem 2018-2019 NIT 701 Cryptography And Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2018-2019 NIT 701 Cryptography And Network Security Question Paper

Printed Pa_es:2 Sub Code: NIT701
Paperld: 113711 ? RollNo.[ I I 1 LJ l l l I J
B. TECH
(SEM VII) THEORY EXAMINATION 2018-19
_CRYPTOGRAPHY AND NETWORK SECURITY
Time: 3 H ours T oral Marks: 100
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
l. Attempt all questions in brief. 2 x 10 = 20
De?ne block cipher
What do you mean by cryptography?
De?ne hash algorithm.
What is stream cipher?
Differentiate between public key and private key
Explain intrusion detection in brief.
What do you mean by mail security?
What is DSS 1n cryptography?
What do you mean by email security?
Describe birthday attack
?-"?-'"P?Q? M0 12-0571?
smug i I ,
2. Attempt any three of the following; I 1.0 x 3? _ 30
a, Draw the block diagram ofDES algorithm. Also explain its ?Jnc110na11ty
b. What IS prime and relai?vy prime numbers 1n cryptography and network secunty
c, Discuss the Messag?. Authentication Codes Also give the Use of Authent1cation
requirements in MAC.
What 15 D1ff1; ?ellman Key Exchange 1n key management?
6. 1 Explain 1nter1'1?t protocol security in detail
SECTION C
3. Attempt any one part of the following: 10 x l = 10
(a) List the Strength of DES 1n bnef Al?s?o expiam Lhe Triple DES,
(b) What is the Shannon?s theory of cb?fusion and d1ffusion in terms of 1nformat10n
security 9
4. Attempt any one part of the fo?amng 10 x l = 10
(11) States the Advanced Encrvpnon Standard (AES) Also provide the [unctioning 01
AES
(b) Explain the Chinese Rema1nde1' theorem w1th example How Ch1nese Remainder
theorem provide the s?curity to online 1nformation shanng transactions
5. Attempt any one part of the following: 10 x l = 10
(a) Whal do you understand from hash functions? Dlscuss the working of Secure hash
algorithm ( SHA) 1n Message Authentication
(b) Explain the Digital Signatures Also give a detail dcscr1pt1on ot Elgamal Digltal
Slgnature Techniques
llF-?age

6. Attempt any one part of the following: 10 x l = 10
(3.) Discuss X509 Certificates in detail. What is the role X509 Certi?cates 1n
cryptography?
(b) What is Electronic mail security? Provide the application of pretty good pIivacy (PGP)
in transaction Authentication
7. Attempt any one part of the following: 10 x 1 = 10
(8.) Explain Secure electronic transaction (SET) in intemet protocol security m detail.
(1)) What do mean by system security? Also discuss Viruses and related threats to
system security.
ZIFage

This post was last modified on 29 January 2020