Download Visvesvaraya Technological University (VTU) BE ( Bachelor of Engineering) CSE 2015 Scheme 2020 January Previous Question Paper 6th Sem 15CS61 Cryptography Network Security and Cyber Laws

nM ?

:

1: ) ?

/

15CS61

Sixth Semester B.E. Degree Examination, Dee

.

./014/1

1

.2020

Cryptography, Network Security and Cyber Laws

Time: 3 hrs. Max. Marks: 80

U

U

r

U

et

, :=

?...7

0

;

II

oc

N

T.;

v

a.)

o

?

2

Note: Answer

a. What do

attacks.

b. Using Extended

a. Design

b. Consider

k=

(i) What

any FIVE

you mean

known plain

a Hill cipher

(

25 3 7

5 9 21

11 8 13

/

is the cipher

full questions, choosing ONE full question from each module.

Module- 1

Euclidean

by cyber attack? List and explain main motives of launching cyber

(08 Marks)

algorithm find the inverse of 12 modulo 79. (08 Marks)

OR

test attack to obtain the key used in the Vigenere cipher. (08 Marks)

m = 3 (block size = 3) with key k shown below:

text corresponding to the plaintext = (VOW)?

(ii) What is the plain text corresponding to the ciphertext = (TQX)? (08 Marks)

Module-2

3 a. List and explain RSA operations. (08 Marks)

b. The modulus in a toy implementation of RSA is 143

(i) What is the smallest value of a valid encryption key and the corresponding

decryption key?

(ii) For the computed encryption key and plaintext = 127, what is the corresponding

ciphertext? (08 Marks)

OR

4 a. In what way are the properties of the cryptographic hash ? the one way property and

collision resistance relevant to the security provided by the MAC? Explain. (08 Marks)

b. Consider the digital signature created using the Signer's private key operation but without

the hash function i.e., sign(m) = EA

pr

( m)

Demonstrate how a forged signature may be created using this definition of a digital

signature. (08 Marks)

Module-3

5 a. What do you mean key management? Explain the fields of an X.509 certificate. (06 Marks)

b. List and explain PKI Architectures. (06 Marks)

c. Define Dictionary Attacks. Explain Attack types. (04 Marks)

OR

6 a. Design the Needham ? Schroeder protocol.

b. Define Kerberos. Explain Kerberos message sequence.

c. Explain SSL Record Layer Protocol.

(06 Marks) ,

(05 Marks)

(05 Marks)

I of 2

FirstRanker.com - FirstRanker's Choice

USN

nM ?

:

1: ) ?

/

15CS61

Sixth Semester B.E. Degree Examination, Dee

.

./014/1

1

.2020

Cryptography, Network Security and Cyber Laws

Time: 3 hrs. Max. Marks: 80

U

U

r

U

et

, :=

?...7

0

;

II

oc

N

T.;

v

a.)

o

?

2

Note: Answer

a. What do

attacks.

b. Using Extended

a. Design

b. Consider

k=

(i) What

any FIVE

you mean

known plain

a Hill cipher

(

25 3 7

5 9 21

11 8 13

/

is the cipher

full questions, choosing ONE full question from each module.

Module- 1

Euclidean

by cyber attack? List and explain main motives of launching cyber

(08 Marks)

algorithm find the inverse of 12 modulo 79. (08 Marks)

OR

test attack to obtain the key used in the Vigenere cipher. (08 Marks)

m = 3 (block size = 3) with key k shown below:

text corresponding to the plaintext = (VOW)?

(ii) What is the plain text corresponding to the ciphertext = (TQX)? (08 Marks)

Module-2

3 a. List and explain RSA operations. (08 Marks)

b. The modulus in a toy implementation of RSA is 143

(i) What is the smallest value of a valid encryption key and the corresponding

decryption key?

(ii) For the computed encryption key and plaintext = 127, what is the corresponding

ciphertext? (08 Marks)

OR

4 a. In what way are the properties of the cryptographic hash ? the one way property and

collision resistance relevant to the security provided by the MAC? Explain. (08 Marks)

b. Consider the digital signature created using the Signer's private key operation but without

the hash function i.e., sign(m) = EA

pr

( m)

Demonstrate how a forged signature may be created using this definition of a digital

signature. (08 Marks)

Module-3

5 a. What do you mean key management? Explain the fields of an X.509 certificate. (06 Marks)

b. List and explain PKI Architectures. (06 Marks)

c. Define Dictionary Attacks. Explain Attack types. (04 Marks)

OR

6 a. Design the Needham ? Schroeder protocol.

b. Define Kerberos. Explain Kerberos message sequence.

c. Explain SSL Record Layer Protocol.

(06 Marks) ,

(05 Marks)

(05 Marks)

I of 2

15CS61

Module-4

7 a. Explain how each key in 802.11i was derived and where it is used.

b. Define Firewall. List and explain main functions of a firewall.

c. Classify Intrusion Detection Systems based on their functionality.

(06 Marks)

(06 Marks)

(04 Marks)

OR

8 a. What is the role of a Bloom Filter in packet logging? (04 Marks)

b. Define SOAP. Explain SOAP messages in HTTP packets. (08 Marks)

c. Demonstrate WS-Trust relationship between entities involved in international trade.

(04 Marks)

Module-5

9 a. List and explain IT act aim and objectives.

b. Explain (i) Secure electronic record (ii) Secure digital signature

c. List and explain Functions of a controller.

OR

10 a. List and explain offences with reference to computer system.

b. When network service providers not to be liable under IT Act? Explain.

c. What are miscellaneous provisions of IT Act? Explain.

* *

(04 Marks)

(04 Marks)

(08 Marks)

*fr

(06 Marks)

(04 Marks)

(06 Marks)

2 of 2

FirstRanker.com - FirstRanker's Choice

This post was last modified on 02 March 2020