Subject Code: 2170709
GUJARAT TECHNOLOGICAL UNIVERSITY
--- Content provided by FirstRanker.com ---
BE- SEMESTER-VII (NEW) EXAMINATION - WINTER 2020
Subject Name: Information and Network Security
Time: 10:30 AM TO 12:30 PM
Instructions:
- Attempt any FOUR questions out of EIGHT questions.
- Make suitable assumptions wherever necessary.
- Figures to the right indicate full marks.
--- Content provided by FirstRanker.com ---
-
- Define: Confidentiality, Authenticity and Integrity. [03]
- Discuss Avalanche effect and Completeness property of a block cipher. [04]
- Explain Playfair cipher technique in detail. Find cipher text for plain text ‘GTUINSEXAM’ using ‘STUDY” as key. [07]
--- Content provided by FirstRanker.com ---
-
- Compare and contrast symmetric key cryptography and asymmetric key cryptography. [03]
- Explain the process of key generation in DES. [04]
- Draw a detailed block diagram of encryption process in DES. Add appropriate description. [07]
-
- Briefly explain Triple DES with two keys. [03]
- Explain public key cryptosystem with neat diagram. [04]
- Calculate all the values of RSA assuming two primes p=17 and q=11. Assume other values appropriately. [07]
-
- State the differences between chosen plain text and chosen cipher text attack. [03]
- Write a short note on Man-in-the-middle attack. [04]
- Calculate all the values for Diffie-Hellman key exchange, consider two primes q=353 and a=3. Assume other values appropriately. [07]
--- Content provided by FirstRanker.com ---
-
- Enlist various web security threats. Explain any one. [03]
- Explain how Birthday attack is carried out. [04]
- Define message authentication code and its characteristics. Discuss MAC based on any standard block cipher. [07]
--- Content provided by FirstRanker.com ---
-
- What are different ways for distribution of public keys? [03]
- Write a short note on PGP. [04]
- Justify the characteristics needed for a hash function. Explain Secure Hash Algorithm-1 in brief. [07]
--- Content provided by FirstRanker.com ---
-
- What is defined by X.509 certificate? Write the process of authentication in X.509. [03]
- What is TGT? Explain its use in Kerberos. [04]
- Write a detailed note on SSL architecture and protocol. [07]
-
- How does secure socket layer protocol work? [03]
- Explain key distribution process using Key Distribution Center (KDC). [04]
- Explain digital signature schemes Elgamal and Schnorr. [07]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Date: 21/01/2021
Total Marks: 56
--- Content provided by FirstRanker.com ---
This download link is referred from the post: GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University