# Download VTU BE 2020 Jan CSE Question Paper 15 Scheme 6th Sem 15CS61 Cryptography Network Security and Cyber Laws

Download Visvesvaraya Technological University (VTU) BE ( Bachelor of Engineering) CSE 2015 Scheme 2020 January Previous Question Paper 6th Sem 15CS61 Cryptography Network Security and Cyber Laws

USN
nM ?
:
1: ) ?
/
15CS61
Sixth Semester B.E. Degree Examination, Dee
.
./014/1
1
.2020
Cryptography, Network Security and Cyber Laws
Time: 3 hrs. Max. Marks: 80
U
U
r
U
et
, :=
?...7
0
;
II
oc
N
T.;
v
a.)
o
?
2
a. What do
attacks.
b. Using Extended
a. Design
b. Consider
k=
(i) What
any FIVE
you mean
known plain
a Hill cipher
(
25 3 7
5 9 21
11 8 13
/

is the cipher
full questions, choosing ONE full question from each module.
Module- 1
Euclidean
by cyber attack? List and explain main motives of launching cyber
(08 Marks)
algorithm find the inverse of 12 modulo 79. (08 Marks)
OR
test attack to obtain the key used in the Vigenere cipher. (08 Marks)
m = 3 (block size = 3) with key k shown below:
text corresponding to the plaintext = (VOW)?
(ii) What is the plain text corresponding to the ciphertext = (TQX)? (08 Marks)
Module-2
3 a. List and explain RSA operations. (08 Marks)
b. The modulus in a toy implementation of RSA is 143
(i) What is the smallest value of a valid encryption key and the corresponding
decryption key?
(ii) For the computed encryption key and plaintext = 127, what is the corresponding
ciphertext? (08 Marks)
OR
4 a. In what way are the properties of the cryptographic hash ? the one way property and
collision resistance relevant to the security provided by the MAC? Explain. (08 Marks)
b. Consider the digital signature created using the Signer's private key operation but without
the hash function i.e., sign(m) = EA
pr
( m)
Demonstrate how a forged signature may be created using this definition of a digital
signature. (08 Marks)
Module-3
5 a. What do you mean key management? Explain the fields of an X.509 certificate. (06 Marks)
b. List and explain PKI Architectures. (06 Marks)
c. Define Dictionary Attacks. Explain Attack types. (04 Marks)
OR
6 a. Design the Needham ? Schroeder protocol.
b. Define Kerberos. Explain Kerberos message sequence.
c. Explain SSL Record Layer Protocol.
(06 Marks) ,
(05 Marks)
(05 Marks)
I of 2
FirstRanker.com - FirstRanker's Choice
USN
nM ?
:
1: ) ?
/
15CS61
Sixth Semester B.E. Degree Examination, Dee
.
./014/1
1
.2020
Cryptography, Network Security and Cyber Laws
Time: 3 hrs. Max. Marks: 80
U
U
r
U
et
, :=
?...7
0
;
II
oc
N
T.;
v
a.)
o
?
2
a. What do
attacks.
b. Using Extended
a. Design
b. Consider
k=
(i) What
any FIVE
you mean
known plain
a Hill cipher
(
25 3 7
5 9 21
11 8 13
/

is the cipher
full questions, choosing ONE full question from each module.
Module- 1
Euclidean
by cyber attack? List and explain main motives of launching cyber
(08 Marks)
algorithm find the inverse of 12 modulo 79. (08 Marks)
OR
test attack to obtain the key used in the Vigenere cipher. (08 Marks)
m = 3 (block size = 3) with key k shown below:
text corresponding to the plaintext = (VOW)?
(ii) What is the plain text corresponding to the ciphertext = (TQX)? (08 Marks)
Module-2
3 a. List and explain RSA operations. (08 Marks)
b. The modulus in a toy implementation of RSA is 143
(i) What is the smallest value of a valid encryption key and the corresponding
decryption key?
(ii) For the computed encryption key and plaintext = 127, what is the corresponding
ciphertext? (08 Marks)
OR
4 a. In what way are the properties of the cryptographic hash ? the one way property and
collision resistance relevant to the security provided by the MAC? Explain. (08 Marks)
b. Consider the digital signature created using the Signer's private key operation but without
the hash function i.e., sign(m) = EA
pr
( m)
Demonstrate how a forged signature may be created using this definition of a digital
signature. (08 Marks)
Module-3
5 a. What do you mean key management? Explain the fields of an X.509 certificate. (06 Marks)
b. List and explain PKI Architectures. (06 Marks)
c. Define Dictionary Attacks. Explain Attack types. (04 Marks)
OR
6 a. Design the Needham ? Schroeder protocol.
b. Define Kerberos. Explain Kerberos message sequence.
c. Explain SSL Record Layer Protocol.
(06 Marks) ,
(05 Marks)
(05 Marks)
I of 2
15CS61
Module-4
7 a. Explain how each key in 802.11i was derived and where it is used.
b. Define Firewall. List and explain main functions of a firewall.
c. Classify Intrusion Detection Systems based on their functionality.
(06 Marks)
(06 Marks)
(04 Marks)
OR
8 a. What is the role of a Bloom Filter in packet logging? (04 Marks)
b. Define SOAP. Explain SOAP messages in HTTP packets. (08 Marks)
c. Demonstrate WS-Trust relationship between entities involved in international trade.
(04 Marks)
Module-5
9 a. List and explain IT act aim and objectives.
b. Explain (i) Secure electronic record (ii) Secure digital signature
c. List and explain Functions of a controller.
OR
10 a. List and explain offences with reference to computer system.
b. When network service providers not to be liable under IT Act? Explain.
c. What are miscellaneous provisions of IT Act? Explain.
* *
(04 Marks)
(04 Marks)
(08 Marks)
*fr
(06 Marks)
(04 Marks)
(06 Marks)

2 of 2
FirstRanker.com - FirstRanker's Choice