FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 8th Sem 2015-16 ECS 084 Cryptography Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 8th Semester (Eight Semester) 2015-16 ECS 084 Cryptography Network Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


FirstRanker's choice

FirstRanker.com


Printed Pages: 4 ECS-084

--- Content provided by​ FirstRanker.com ---

(Following Paper ID and Roll No. to be filled in your Answer Books)

Paper ID : 110854 Roll No.

B.TECH.

Theory Examination (Semester-VIII) 2015-16

CRYPTOGRAPHY & NETWORK SECURITY

--- Content provided by‍ FirstRanker.com ---

Time : 3 Hours Max. Marks : 100

Note : Attempt questions from all Sections as per directions.

Section-A

Attempt all parts of this section. Answer in brief. (2×10=20)

  1. (a) Find gcd (1970, 1066) using Euclid's algorithm?
  2. (b) Using Row Transposition technique & given key as "2 5 4 1 3" generate the Cipher Text for the following plain text "a convenient way to express the transposition".
  3. --- Content provided by FirstRanker.com ---

  4. (c) Perform encryption and decryption using RSA Algorithm for the following. P=7; q=11; e=17; M=8.
  5. (d) What are the design parameters of Feistel cipher network?
  6. (e) Using Playfair technique, encrypt the following message "send more money" using the key - "tarun".
  7. (f) What is the difference between Shift Rows and Rot Word?
  8. (g) Briefly describe Add Round Key.
  9. --- Content provided by‌ FirstRanker.com ---

  10. (h) What are the two problems with one-time pad?
  11. (i) Define the classes of message authentication function.
  12. (j) Explain in brief Symmetric and Asymmetric cryptography.

Section-B

Attempt any five questions from this section. (10×5=50)

  1. (a) If n is composite and passes the Miller-Rabin (MR) primarily test for the base a. then n is called strong pseudo prime to the base a. Show that 2047 is strong pseudo prime to the base 2.
  2. --- Content provided by⁠ FirstRanker.com ---

  3. (b) What do you mean by Security Association? Specify the parameters that identify the Security Association? Explain man in the middle attack?
  4. (c) What is the key algorithms used in S/MIME? What are the headers fields define in MME?
  5. (d) Differentiate MAC and Hash function. Assume the client C wants to communicate server S using Kerberos procedure. How can it be achieved?
  6. (e) What is message authentication code? How it differs from hash function? What are the requirements of hash function? Suggest at least one scheme to show that symmetric encryption algorithm can also be used to generate message authentication code.
  7. (f) Compare and contrast a conventional ink based signature and a digital signature. Describe the Elgamal scheme of digital signature generation and verification. Why do signatures of the same message, signed on different occasions differ?
  8. --- Content provided by‍ FirstRanker.com ---

  9. (g)
    1. Explain the Chinese Remainder Theorem. Use it to solve: X=2 mod 3, X=3 mod 5 and X=2 mod 7.
    2. State and prove Fermat's theorem.
  10. (h) Why do we use X.509 authentication over PKC based authentication. Also explain the format of X.509 and how is an X.509 certificate revoked?

Section-C

Attempt any two questions from this section. (15×2=30)

--- Content provided by‍ FirstRanker.com ---

  1. Discuss symmetric key distribution. Also describe Diffie-Hellman Key exchange algorithm. Consider the Diffie-Hellman scheme with common prime number q=71 and primitive root a=7 :
    1. If user A has a private key XA=5, what is A's public key.
    2. If the user A has private key X =9 then what is B's public key?
    3. What is shared key?
  2. What is DSS? Explain the two approaches of DSS. Also differentiate between ink based signature and digital signature. Explain DSA algorithm.
  3. --- Content provided by FirstRanker.com ---

  4. Explain the following:
    1. ICMP
    2. IGMP
    3. ARP
    4. DDI
  5. --- Content provided by FirstRanker.com ---


FirstRanker.com



This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University

--- Content provided by⁠ FirstRanker.com ---