0% found this document useful (0 votes)
110 views2 pages

Siddaganga Institute of Technology, Tumkur - 572 103: Usn 1 S I ECEL26

1. Masquerade attacks can be classified as an impersonation attack. Encryption of one bit at a time is called a stream cipher. Symmetric ciphers use a single key for encryption. 2. Two important security issues addressed in public key encryption are authentication and confidentiality. A digital signature is achieved by using the private key of encryption. 3. A hash function is generated by using a cryptographic hash function. Diffie-Hellman key exchange protocol is insecure against man-in-the-middle attacks.

Uploaded by

a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views2 pages

Siddaganga Institute of Technology, Tumkur - 572 103: Usn 1 S I ECEL26

1. Masquerade attacks can be classified as an impersonation attack. Encryption of one bit at a time is called a stream cipher. Symmetric ciphers use a single key for encryption. 2. Two important security issues addressed in public key encryption are authentication and confidentiality. A digital signature is achieved by using the private key of encryption. 3. A hash function is generated by using a cryptographic hash function. Diffie-Hellman key exchange protocol is insecure against man-in-the-middle attacks.

Uploaded by

a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

USN 1 S I ECEL26

Siddaganga Institute of Technology, Tumkur – 572 103


(An Autonomous Institution affiliated to Visvesvaraya Technological University, Belgaum, Approved by AICTE, New Delhi, Accredited by NBA, New Delhi,
An ISO9001:2008 Certified)

Eighth Semester B.E. Electronics & Commn. Engg. Examinations May - June 2014
Cryptography and Network Security
Time: 3 Hours Max. Marks: 100
Not : 1. Question No. 1 is Compulsory
e
2. Answer any 4 full questions from question No. 2 to Question No. 6

1 a) Masquerade can be classified as ______ attack.


b) A technique by which letters of plain text is replaced by other letters is called ______.
c) The DES encryption algorithm uses ______ key to encrypt ______ plain text.
d) One of the advantages of DES encrypture is ______.
e) 4 (mod 23) is equal to ______.
f) Encryption of one bit at a time is called ______ cipher.
g) Symmetric ciphers use ______ key for encryption.
h) Two important security issues addressed in public key encryption are ______ and ______.
i) A digital signature is achieved by ______ key of encryption.
j) A message authentication code is a function of both ______ and ______.
k) A hash function is generated by using ______.
ℓ) Diffie-Hellman key exchange protocol is insecure against ______ attack.
m) The digital signature standard uses the key ______ in addition to private and public key
components.
n) Two important web based security approaches at network level and transport level are ______
and ______.
o) Mention the advantages of 3-DES.
p) A dual signature links ______ messages intended to two different recipients.
q) Honey pots are designed to ______ from accuring computer system programmes.
r) Unix password scheme uses ______ and ______ for encryption.
s) One of the important malicious software ______ contain hidden code when invoked performs
harmful function.
t) A Malicious program that replicates itself and make capture of its own and sends from
computer to compute is called ______. 1  20
2 a) Define models for network security and access security with a neat diagram. Explain the
security aspects for both the models. 7
b) Distinguish between manoalphabetic and polyalphabetic substitution ciphers and highlight the
advantages and weakness of these ciphers. 7
c) Using playfairs cipher. Find the cipher text for the plain text. SIT COLLEGE OF
ENGINEERING WITH the key : ‘’TECHNOLOGY’’. 6
3 a) Describe with a diagram a single round of DES algorithm and key generation for a Text of 64
bits and key size of 56 bits. 7
b) Explain with a diagram AES encryption process and highlight the AES data structure. 7
c) Write notes on any one of the following.
i) Avalanche effect ii) Differential crypt analysis iii) Feistel network iv) AES key
expansion. 6
4 a) Prove the Eulers theorem and show that for every a and n that are relatively prime.
a(n) = 1(mod n), where (n) in Euler’s Totient function. 6
-1- Please Turn Over

-2- ECEL26
b) Explain the RSA algorithm with key generation and an example for encryption and 8
decryption for P=17, q=11 and generate the public key and private key.
c) Define Hash function and show that how authentication and confidentiality both can be
achieved using Hash function. 6

5 a) Explain with a neat figure the digital signature standard (DSS) algorithm. Show how the DSS
signing and verifying is achieved. 7
b) Explain the procedures for UNIX password generation scheme to achieve password
protection from intruders. 7
c) Write notes on any one of the following.
i) Authentication protocols ii) Different approaches for digital signatures
iii) Web security approaches iv) Alert protocol v) SET procedure. 6

6 a) What are the two categories of malicious program? Explain each category with an example. 6
b) Explain the functioning of digital immune system for virus counter measures. Define the role
of blocking software. 6
c) Describe the three firewall configuration with a neat diagram. 8
________

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy