FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Get the Nursing Question Bank Android App

Access 10+ years of Question Papers with answers, notes for B.Sc Nursing on the go!

Install From Play Store

Download DU (University of Delhi) B-Tech 7th Semester Information Security Question Paper

Download DU (University of Delhi) B-Tech (Bachelor of Technology) 7th Semester Information Security Question Paper

This post was last modified on 31 January 2020

--- Content provided by⁠ FirstRanker.com ---

Name of the Paper
Semester
Time : 3 Hours
cu. m
: 2341702

--- Content provided by‍ FirstRanker.com ---

: B.Tech. Computer
Science
: CS-702 Information
Security
: VII

--- Content provided by FirstRanker.com ---

Maximum Marks : 75
Instructions for Candidates :
(a) Write your Roll No. on the top immediately
on receipt of
this question paper.

--- Content provided by‍ FirstRanker.com ---

(b) Section - A is compulsory.
together.
(c) Attempt any 4 questions from Section - B.
Parts of a question must be answered
Section - A

--- Content provided by⁠ FirstRanker.com ---

1. (a) What is
vulnerability
i
the difference between
and exposure ? 2

--- Content provided by‍ FirstRanker.com ---

P.T.O.

6132
(b)
(C)

--- Content provided by‍ FirstRanker.com ---

(d)
(f)
(g)
(h)
(i)

--- Content provided by⁠ FirstRanker.com ---

De?ne linear congruence. Solve the
questions 3x + 4 5 (mod 13). 3
Find the multiplicative inverse of 132 in
Z . 3
l80

--- Content provided by‍ FirstRanker.com ---

Differentiate between block ciphers and
stream ciphers. 3
Use af?ne cipher to encrypt the message
"Today is our- IS exam" with the key pair
(7.2). 2

--- Content provided by‌ FirstRanker.com ---

Explain the concept of Fiestal Network. Also
prove that the mixer in Fiestal Cipher is
self-invertible. 5
Why does a round key generator need a
parity dr6p table ? 3

--- Content provided by‌ FirstRanker.com ---

What is a honeypot ? How is it different
from a honeynet ? 2
Describe the legal issues in Security.
, z/ 2
(j)

--- Content provided by⁠ FirstRanker.com ---

(k)
(1)
(a)
(b)
6132

--- Content provided by FirstRanker.com ---

What would be the code word corresponding
to the message (1101). The generator
matrix, is given below : 2
g0 l l 0 l 0 0 0
G: g, = 0 l l 0 l 0 O

--- Content provided by‍ FirstRanker.com ---

g2 1 l l 0 0 1 0
g3 1 0 l 0 0 0 1
Explain Man in the middle attack with a
suitable example. 3
Explain the Public key Infrastructure.

--- Content provided by‍ FirstRanker.com ---

Section - B
Use the Playfair Cipher t0 encipher the
message "Information need to be secure".
The secret key can be made by filling the
matrix diagonally from top left corner.

--- Content provided by​ FirstRanker.com ---

Consider alphabets 'Y' and '2' together in
one cell of the matrix. 5
A Vigenere Cipher is a combination of m
additive ciphers. Justify with an example.
5

--- Content provided by‍ FirstRanker.com ---

p 3 P.T.O.

6132 *
3.
(a) Consider a symmetric (8,4) code whose

--- Content provided by‌ FirstRanker.com ---

parity ? check equations are.
6+4=10
V0=ul+u2+u3
Vl=u0+ul+u2
V2=uo+ul+ua

--- Content provided by‍ FirstRanker.com ---

v3 = uO + u2 + ?3
Where 1.10 111 uz'and 113 are message digits
and Von V2 and V3 are parity-check digits.
Find the generator and parity-check
matrices for this code. Determine the

--- Content provided by‍ FirstRanker.com ---

minimum distance of this code.
(b) Determine the weight distribution of the
18,4) linear code given In above problem.
Assume the transition probability of a BSC
be p = 102. Compute the probability ef an

--- Content provided by‍ FirstRanker.com ---

undetected error of this code. I/
6132
If generator g = 2 and p = 11, use Dif?e?Hcllman
algorithm to solve the following for User A and
User B. 1+4+4+l

--- Content provided by FirstRanker.com ---

(a) Show that 2 is primitive root of 1 1.
(b) If A has public key 9 then what is A's private
key.
(c) If B has public key 3 then what is B's private
key.

--- Content provided by‍ FirstRanker.com ---

((1) Calculate the shared secret key.
(3) Using the S?box below find out the result
of passing strings.
(i) 1 101 1 1
(ii) 001 100

--- Content provided by FirstRanker.com ---

?)1111;1
5 P.T.O.

6132 ' ?
S-Box Table i 6 1 32

--- Content provided by​ FirstRanker.com ---

0123 456789101112131415
7. Write a short notes on (any five) :
0 10000914 06031505 01 1312 07 11040208 : 2x5=10
1 13 07 00 09 03 04 0610 02 08 05 14 12 11 15 01 i (a) Honeypots
2 13 06 04 09 08 15 03 oo 11 01 02 12 05 1o 14 07 (b) DigitalSignaturc

--- Content provided by⁠ FirstRanker.com ---

3 01 10 13 oo 06 09 08 07 04 15 14 03 11 .05 02 12 (c) E-mailSecurity
(b) Brie?y describe the components of DES (d) Threats
including key generation. 7 (e) Transposition Cipher
. . . . neTime Pad
6. Brlefly explam Rabm Key Generatlon (0 0

--- Content provided by⁠ FirstRanker.com ---

Algorithm. Assume the private key pair is (23,
1]). Calculate the Cipher text if the plain text
is 24.Also calculate all four.possib1e plain text 1
for the corresponding cipher text. 10
f > .t

--- Content provided by​ FirstRanker.com ---

I.
// j
6 v
,r? 7 500
/

--- Content provided by‌ FirstRanker.com ---