FirstRanker's choice
Printed Pages: 4 ECS-084
--- Content provided by FirstRanker.com ---
(Following Paper ID and Roll No. to be filled in your Answer Books)
Paper ID : 110854 Roll No.
B.TECH.
Theory Examination (Semester-VIII) 2015-16
CRYPTOGRAPHY & NETWORK SECURITY
--- Content provided by FirstRanker.com ---
Time : 3 Hours Max. Marks : 100
Note : Attempt questions from all Sections as per directions.
Section-A
Attempt all parts of this section. Answer in brief. (2×10=20)
- (a) Find gcd (1970, 1066) using Euclid's algorithm?
- (b) Using Row Transposition technique & given key as "2 5 4 1 3" generate the Cipher Text for the following plain text "a convenient way to express the transposition".
- (c) Perform encryption and decryption using RSA Algorithm for the following. P=7; q=11; e=17; M=8.
- (d) What are the design parameters of Feistel cipher network?
- (e) Using Playfair technique, encrypt the following message "send more money" using the key - "tarun".
- (f) What is the difference between Shift Rows and Rot Word?
- (g) Briefly describe Add Round Key.
- (h) What are the two problems with one-time pad?
- (i) Define the classes of message authentication function.
- (j) Explain in brief Symmetric and Asymmetric cryptography.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Section-B
Attempt any five questions from this section. (10×5=50)
- (a) If n is composite and passes the Miller-Rabin (MR) primarily test for the base a. then n is called strong pseudo prime to the base a. Show that 2047 is strong pseudo prime to the base 2.
- (b) What do you mean by Security Association? Specify the parameters that identify the Security Association? Explain man in the middle attack?
- (c) What is the key algorithms used in S/MIME? What are the headers fields define in MME?
- (d) Differentiate MAC and Hash function. Assume the client C wants to communicate server S using Kerberos procedure. How can it be achieved?
- (e) What is message authentication code? How it differs from hash function? What are the requirements of hash function? Suggest at least one scheme to show that symmetric encryption algorithm can also be used to generate message authentication code.
- (f) Compare and contrast a conventional ink based signature and a digital signature. Describe the Elgamal scheme of digital signature generation and verification. Why do signatures of the same message, signed on different occasions differ?
- (g)
- Explain the Chinese Remainder Theorem. Use it to solve: X=2 mod 3, X=3 mod 5 and X=2 mod 7.
- State and prove Fermat's theorem.
- (h) Why do we use X.509 authentication over PKC based authentication. Also explain the format of X.509 and how is an X.509 certificate revoked?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Section-C
Attempt any two questions from this section. (15×2=30)
--- Content provided by FirstRanker.com ---
- Discuss symmetric key distribution. Also describe Diffie-Hellman Key exchange algorithm. Consider the Diffie-Hellman scheme with common prime number q=71 and primitive root a=7 :
- If user A has a private key XA=5, what is A's public key.
- If the user A has private key X =9 then what is B's public key?
- What is shared key?
- What is DSS? Explain the two approaches of DSS. Also differentiate between ink based signature and digital signature. Explain DSA algorithm.
- Explain the following:
- ICMP
- IGMP
- ARP
- DDI
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University
--- Content provided by FirstRanker.com ---