Download AKTU B-Tech 7th Sem 2015-2016 EIT 701 Cryptography Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2015-2016 EIT 701 Cryptography Network Security Question Paper

Printed Pages: 3 150 EIT-701
(Following Paper ID and Roll No. to be ?lled in your
' Answer Book) ?
' Roll No.
B.Tech.
(SEM. VII) THEORY EXAMINATION, 2015-16
CRYPI?OGRAPHY & NETWORK SECURITY
[Time:3 hours] ? [MaximumMarksz 100]
. SECI?ION-A
Note : Attempt gl_l' parts. All parts carrylequal marks. Write
answer of each part in short. . (2 X 10=20)
1. (a) Specify two differences between procedural and
obj ect oriented language.
(b) What is a Stream cipher?
(c) What is an authenticated Dif?e-Hellman key
' agreement?
(d) Distinguish between an active and passive attack.
((3) What are-Message Authentication Codes (MACS)?
" (f) What requirements should a digital signature
scheme satisfy?
5400 (1) I p.10.

(g) What type of security goals are used in-
' cryptography? ?
(h) De?ne S/MINE.
(i) What are the requirements for the use of a puhlic 1
key certi?cates scheme?
(j). Explain brie?y- the two different approaches of
DigitalSignature? '
' SECTION-B
Note: Attempt any f1_ve questions from this seetion.
2.
5400
(1 0 X 5 =50)
What are the properties of modular arithmetic
operation?? What are the requirements of Message
Authentication Code (MAC)? List and explain them.
Encrypt the message ?THIS IS AN EXERCISE? using
Playfair Cipher with Key=DOLLARS.
What is I Kerberos? Discuss Kerberos version 4 in
detail? .
De?ne the Chinese remainder theorem? Find the values
of x for the following sets of congruence using the
Chinese remainder theorem.
X=2 mod 7 and X=3 mod 9
What ?re the securities of RSA? Perform encryption
and decryption using RSA; algorithm for
>p=17, q=ll, e=7, m=88.
(2) ' EIT?701
Note:
10.
ll.
12.
5400
What is the principle of public-key cryptosystetns.
Discuss the applications for public-key cryptosystems.
What are the properties of modular arithmetic
operation?
De?ne group ?eld and ?nite ?eld ofthe form 613(1)).
SECTION-C
Attempt any tlo questions from this section.
(15 ><2=30)
Find the values of x for the following sets of Congruence
using the Chinese remainder theorem. "
X=2 (mod 3)
/
X=1 (mod 4)
X=3 (mod 5)
Explain RSA al gorithm. Perform encryptiOn and
decryption using RSA algorithm for p=.l 1, q=13, e=7,
m=9. .
Draw block diagram of DES encryption. Also discuss
the strengths of DES.
(3) EIT-701

This post was last modified on 29 January 2020