Sem 7 All Gtu Papers
Sem 7 All Gtu Papers
___________
Q.1 (a) Explain the role of linker, loader and preprocessor in the process of 03
compilation.
(b) Define lexeme, token and pattern. Identify the tokens from the following 04
program segment
void change (int c, int d)
{ int m; m = c; c= d; d = m; }
(c) Explain the phases of compiler with an example. 07
Q.2 (a) Find the Regular Expression corresponding to given statement subset of 03
{0,1}*
1) The Language of all strings containing exactly three 1’s
2) The Language of all strings begins or ends with 00
3) The Language of all strings that contain at least three 1’s
(b) What is Left Recursion? Give an example for eliminating the same 04
(c) Draw DFA for the following regular expression without construction of 07
NFA.
( a | b) * a (a | b)#
OR
(c) Explain recursive-descent parsing with suitable example. 07
Q.3 (a) Explain the stack implementation of shift reduce parser with the help of 03
example.
(b) What is inherited attribute? Explain with suitable example. 04
(c) Check the following grammar is SLR(1) or not 07
S → Aa | bAc | Bc | bBa
A→d
B→d
OR
Q.3 (a) Define the following terms: 03
1) LL(1) Grammar 2) Ambiguous Grammar 3) Operator Grammar
(b) Find out FIRST & FOLLOW set for all the Nonterminals 04
S-> 1AB | ϵ
A-> 1AC | 0C
B-> 0S
C-> 1
(c) Write a syntax directed definition for desk calculator. Using this definition 07
draw annotated parse tree for 6*3+5n
1
Q.4 (a) Explain Activation Record 03
(b) Explain panic mode and phrase level error recovery techniques. 04
(c) Explain quadruple, triple and indirect triple with suitable example. 07
OR
Q.4 (a) Explain flow graph with suitable example. 03
(b) Explain dynamic storage allocation techniques. 04
(c) Explain syntax directed definition to produce three address codes for flow 07
of control statements with suitable example.
Q.5 (a) Draw the parse tree and derive the left most derivation using the following 03
grammar for the input string: (a + a) * (a * a).
E→E+T|T
T→T*F|F
F→(E)|a
(b) Write down the algorithm for partitioning of basic blocks. 04
(c) Explain any four code optimization techniques with suitable example. 07
OR
Q.5 (a) Explain code scheduling constraints. 03
(b) Write short note on LEX. 04
(c) Explain the generic issues in the design of code generators. 07
2
Seat No.: ________ Enrolment No.___________
MARKS
Q.3 (a) What is lexical analysis? Which are the tasks performed by lexical 03
analyzer.
(b) Give the rule to remove left recursive grammar. And Eliminate left 04
recursion from following grammar.
S → Aa | b
A → Ac | Sd | f
(c) Show the following grammar is LR(1) but not LALR(1). 07
S->Aa │bAc │Bc│bBa
A->d
B->d
OR
Q.3 (a) Write RE the following language.. 03
1. All string of 0’s and 1’s that do not contain 11.
2. All string of 0’s and 1’s that every 1 is followed by 00
(b) What is left factoring in CFG? Perform the Left factoring of following 04
Grammar.
S → iEtS / iEtSaS / a
E→b
1
(c) Construct SLR parsing table for the following grammar : 07
S → (L) | a
L→ L,S | S
*************
2
Seat No.: ________ Enrolment No.___________
2
Seat No.: ________ Enrolment No.___________
Q.3 (a) Consider the following grammar to construct leftmost and right most 03
derivation for the sentence abab.
SaSbS|bSaS|ε
(b) Write rule(s) to check grammar is left recursive or not. Remove left 04
recursive from the following grammar.
SaBDh
BBb|c
DEF
Eg| ε
Ff| ε
(c) Construct the SLR parsing table for the following Grammar. 07
E E+T | T
T T*F | F
F (E) | id
S -> CC
C -> cC
C -> d
1
Q.5 (a) Define : 1) synthesized attribute 2) inherited attribute 03
(b) Explain any two parameter passing methods. 04
(c) Write SDD for arithmetic expression and Construct annotated parse tree for 07
the input expression (4*7+1)*2 .
*************
2
Enrolment No./Seat No_____________
MARKS
Q.1 (a) State the applications of language processors. 03
(b) Explain input buffering techniques in brief. 04
(c) Explain cousins of compiler in detail. 07
Q.2 (a) Enlist types of compiler. Explain any two in brief. 03
(b) Explain error recovery strategies in brief. 04
(c) Explain construction of DFA from regular expression without making 07
NFA with suitable example.
OR
(c) Explain role of lexical analyzer with example in compiler design process. 07
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Define lexemes, patterns and tokens 03
(b) Write a regular definition for: 04
1. The language of all strings containing at least one 0 and at
least one 1.
2. The language of all strings that do not end with 01.
3. The language of all strings containing 0’s and 1’s both are
even.
4. The language of all strings which are starting with 1 and
ending with 0.
Q.3 (a) Give the translation scheme that convert infix to postfix notation. 03
(b) Define: Left Recursive Grammar. Check Following grammar is left 04
recursive or not, if yes, remove left recursive from it.
A → ABd / Aa / a
B → Be / b
(c) Construct an SLR Parsing table for the following grammar. 07
S Aa | bAc | bBa
Ad
Bd
OR
Q.3 (a) Explain shift reduce parsing technique in brief. 03
(b) Differentiate top down parsing and bottom up parsing. 04
(c) Show that the following grammar 07
S AaAb | BbBa
Aϵ
Bϵ
is LL(1) but not SLR(1).
1
Q.4 (a) Write a short note on activation record. 03
(b) Explain Symbol table management in brief. 04
(c) List and explain various storage allocation strategies. 07
OR
Q.4 (a) What do you mean by dangling references? 03
(b) Explain Error Recovery Strategies in Compiler in brief. 04
(c) Write three address code for 07
a = b*-c + b*-c
*************
2
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Explain the roles of linker, loader and preprocessor. 03
(b) What is Input Buffering? Why it is used? 04
(c) Explain the language dependent and machine independent phases of 07
compiler. Also List major functions done by compiler.
Q.3 (a) What do you mean by left recursion and how it is eliminated? 03
(b) What is ambiguous grammar? Show that S -> aS|Sa|a ia an ambiguous 04
grammar.
(c) Consider the following grammar: 07
S’ = S#
S -> ABC
A -> a|bbD
B -> a| Ꜫ
C -> b| Ꜫ
D -> c| Ꜫ
Construct FIRST and FOLLOW for the grammar also design LL(1)
parsing table for the grammar
OR
Q.3 (a) Differentiate between top down parser and bottom up parser. 03
(b) Explain handle and handle pruning 04
(c) Consider the following grammar 07
S -> AA
A -> aA
A -> b
And construct the LALR parsing table.
*************
2
Seat No.: ________ Enrolment No.___________
Q.3 (a) Explain following commands of HDFS with syntax and at least one 03
example of each.
(i) copyFromLocal (ii) mv (iii) cat
(b) Write basic wordcount program using PySPARK. 04
(c) What is transformation and actions in Apache Spark? Discuss various 07
commands available for this activity in Apache Spark?
OR
Q.3 (a) Discuss various benefits of stream processing. 03
(b) What is RDD? Explain role of RDD in Spark. 04
(c) Describe different types of NoSQL databases with the help of example. 07
*************
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.2 (a) Explain basic Components of Analyzing the Data with Hadoop. 03
(b) What is Map Reduce and explain How Map Reduce Works? 04
(c) Brief Anatomy of a Map Reduce Job run and Failures. 07
OR
(c) Describe Map Reduce Types and Formats. 07
Q.3 (a) Explain NoSQL data architecture. 03
(b) Elaborate Key-value stores, Graph stores, Column family stores & 04
Document stores.
(c) Describe analyzing big data with a shared-nothing architecture. 07
OR
Q.3 (a) Difference between master-slave versus peer-to-peer distribution models. 03
(b) What is a big data NoSQL? Explain in details. 04
(c) Which Four ways that NoSQL systems handle big data problems. 07
Q.4 (a) What is Stream Computing and Sampling Data in a Stream. 03
(b) Write the application of RTAP. 04
(c) Explain Stream Data Model and Architecture. 07
OR
Q.4 (a) How Graph Analytics used in Big Data. 03
(b) Write a short note on Decaying Window. 04
(c) Explain with example: How to perform Real Time Sentiment Analysis of 07
any product.
Q.5 (a) What is the use of Pig and Hive in Big Data? 03
(b) Describe data processing operators in Pig. 04
(c) Describe HBase and ZooKeeper in details. 07
OR
Q.5 (a) Explain HIVE services. 03
(b) Write application of writing Spark. 04
(c) Describe any application that you know related to enhance particular 07
business using big data and explain how it is important as a business
prospective.
*******
1
Seat No.: ________ Enrolment No.___________
1
Seat No.: ________ Enrolment No.___________
Q.2 (a) List various configuration files used in Hadoop Installation. What is use 03
of mapred.
(b) Explain the difference between structure and unstructured data. 04
(c) Discuss Big Data in Healthcare,Trasportation & Medicine. 07
OR
(c) Discuss Hadoop YARN in detail with failures in classic MapReduce. 07
*************
1
Seat No.: ________ Enrolment No.___________
Q.3 (a) Discuss role of Data node and Name node in HDFS. 03
(b) Explain features and advantages of NoSQL. 04
(c) What is data stream mining? Explain stream data model and its 07
architecture in detail.
OR
Q.3 (a) What do you mean by job scheduling in Hadoop? List different 03
schedulers in Hadoop.
(b) What is NoSQL database? List the differences between NoSQL and 04
relational databases.
(c) Explain Counting oneness in a Window and Decaying Window of 07
mining data stream in detail.
*************
Seat No.: ________ Enrolment No.___________
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Compare LAN and WAN. 03
(b) Differentiate GSM and GPRS. 04
(c) Define channel capacity. Explain Nyquist and Shannon’s criteria to find 07
Channel Capacity.
capacity
Q.2 (a) Compare FDM vs TDM. 03
(b) Compare Packet Switching and Circuit switching. 04
(c) Describe GSM Authentication and security. 07
OR
(c) Draw and explain GSM Network Architecture. 07
1
Seat No.: ________ Enrolment No.___________
*************
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Enlist various multiplexing techniques and explain any one. 03
(b) Compare Packet switching and Circuit Switching. 04
(c) Define channel capacity and various factors which affect it. State 07
Nyquist and Shannnon criteria.
Q.3 (a) Enlist types of Antenna and Explain any one of them. 03
(b) Describe CRC in brief. 04
(c) Compare 1G,2G,3G and 4G technology. 07
OR
Q.3 (a) Explain Piconet and Scatternet. 03
(b) Describe WAP in brief. 04
(c) Describe Multiple Access with Collision Avoidance and explain 07
how hidden terminal problem can be solved by it.
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Describe IMSI,IMEI, MSRN in brief. 03
(b) Compare Packet Switching and Circuit Switching. 04
(c) Describe the factors that affect Channel Capacity. Explain Nyquist 07
and Shannon Criteria for finding Channel Capacity.
OR
Q.3 (a) Describe various Transmission Media in brief. 03
(b) Compare 1G, 2G , 3G and 4G Technology. 04
(c) Write needs of ARQ. Explain ARQ in detail. 07
*************
1
Enrolment No./Seat No_____________
MARKS
*************
1
Seat No.: ________ Enrolment No.___________
Marks
Q.1 (a) What is “Artificial Intelligence and Artificial Intelligence Technique”? 03
(b) Explain the algorithm for steepest hill climbing. 04
(c) Enumerate Classical “Water jug Problem”. Describe the state space for this 07
problem and also give the solution.
Q.2 (a) Differentiate prepositional & predicate logic. 03
(b) What is clausal form? How is it useful? 04
(c) What is A* search? Explain various stages of A* search with an example. 07
OR
(c) Define constraint satisfaction problem (CSP). How CSP is formulated as a 07
search problem?
1
Seat No.: ________ Enrolment No.___________
Q.1 (a) What is a “control strategy” and what are its characteristics? 03
(b) Describe in brief how Min-Max search procedure works. 04
(c) Enlist and discuss major task domains of Artificial Intelligence. 07
Q.2 (a) Discuss briefly backward reasoning with example. 03
(b) Explain with example how recursive predicate is defined in Prolog? 04
(c) State Water Jug problem. Give its state space representation 07
OR
(c) Explain A* algorithm. What happens if h’ underestimates h and 07
overestimates h?
Q.3 (a) Explain local maxima, plateau and ridge in brief 03
(b) Discuss the approaches to knowledge representation 04
(c) Demonstrate briefly the steps to convert given wff into clause form 07
OR
Q.3 (a) Differentiate Informed & Uninformed search. Give examples. 03
(b) Explain best first search algorithm. 04
(c) Consider the following facts: 07
* Hemant only likes easy courses.
* Science courses are hard.
* All the courses in basketweaving department are
easy.
* BK301 is a basketweaving course.
Use resolution to answer the question,”What course would Hemant
like?”
Q.4 (a) What is certainty factor? 03
(b) Discuss Bayesian network and its application. 04
(c) Explain connectionist models. What is perceptron? What is the concept 07
of back propagation for ANNs?
OR
Q.4 (a) What do you mean by Expert Systems? List out its four applications. 03
1
Enrolment No./Seat No_____________
MARKS
Q.1 (a) Define the term: Artificial Intelligence. State various applications of 03
Artificial Intelligence.
(b) Enlist and briefly discuss the major task domains of Artificial Intelligence. 04
(c) Explain AI problem characteristics in detail. 07
Q.2 (a) What is meant by control strategy? State the requirements of a good control 03
strategy.
(b) Explain the nonmonotonic reasoning. 04
(c) Consider the water jug problem stated below: 07
You are given two jugs, a 5-litre one and a 4-litre one. Neither has any
measuring marker on it. There is a pump that can be used to fill the jugs
with water. How can you get exactly 2-litre of water into the 4-litre jug?
Explain how this problem can be solved using State Space Search. Also,
give the production rules to solve this problem and derive a feasible
solution using the same.
OR
(c) In the missionaries and cannibals problem, three missionaries and three 07
cannibals must cross a river using a boat which can carry at most two
people, under the constraint that, number of cannibals should be lesser
than or equal to the missionaries on either side. The boat cannot cross the
river by itself with no people on board.
OR
1
Q.3 (a) Write the proposed solution(s) for the problems occurred in hill climbing. 03
(b) Explain the natural language processing steps in brief. 04
(c) Explain forward and backward reasoning with suitable example(s). 07
OR
Q.4 (a) Write the basic differences between declarative and procedural knowledge. 03
(b) Write a prolog program to demonstrate the use of cut and fail predicates. 04
*************
2
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) Explain the “Turing test”. 03
(b) Explain the different issues in Knowledge representation. 04
(c) Enlist and discuss major task domains of Artificial Intelligence. 07
2
Seat No.: ________ Enrolment No.___________
Q.1 (a) Define AI. What are the task domains of AI? 03
(b) Explain Water Jug problem with Sate Space Search method. 04
(c) Explain Best First Search with suitable example. 07
Q.4 (a) Briefly explain any one application of Natural Language Processing. 03
(b) A bag I contains 4 white and 6 black balls while another Bag II contains 4 04
white and 3 black balls. One ball is drawn at random from one of the bags,
and it is found to be black. Find the probability that it was drawn from Bag
I.
(c) Explain Roulette-Wheel selection method of genetic algorithm. 07
OR
Q.4 (a) Enlist and describe different phases involved in Natural Language 03
Processing.
(b) The task is to recognize English alphabetical characters (F, E, X, Y, I, T) 04
in an image processing system. Define two fuzzy sets 𝐼̃ and 𝐹̃ to represent
the identification of characters I and F.
𝐼̃={(F, 0.4), (E, 0.3), (X, 0.1), (Y, 0.1), (I, 0.9), (T, 0.8)}
𝐹̃ ={(F, 0.99), (E, 0.8), (X, 0.1), (Y, 0.2), (I, 0.5), (T, 0.5)}
1
Find the following.
1. 𝐼̃ ∪ 𝐹̃
2. 𝐼̃ − 𝐹̃
(c) Describe the phases of genetic algorithm. 07
*************
2
GVA
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) What is your understanding of the term “chain of custody” in the context 03
of digital forensics?
(b) What is digital forensics explain the process of digital forensics? 04
(c) Define: hibernating files, examining window registry, recycle bin operation 07
Operation.
Q.2 (a) Explain forensic science. 03
(b) Describe forensic cloning of evidence. 04
(c) What is locard's exchange principle and how does it apply to digital forensics? 07
OR
(c) Explain order of volatility in brief. 07
Q.3 (a) What types of tools can be selected for use in mobile device 03
investigations?
(b) Why it is important in the forensic investigation to work on duplicate image? 04
(c) Describe techniques to remove metadata. 07
OR
Q.3 (a) What is hashing explain hashing concepts to maintain the integrity of 03
evidence?
(b) Write a note on Electronics discovery. 04
(c) Discuss e-mail header forensic in brief. 07
Q.4 (a) What are the legal provisions against cyber crime? 03
(b) Explain tool validation in context of quality assurance. 04
(c) Explain Hashing concepts to maintain the integrity of evidence. 07
OR
Q.4 (a) What are three types of tools used by digital forensic examiners? 03
(b) What relevance does metadata have to the evidence collected? 04
(c) Define and differentiate Live and dead system forensic. 07
Q.5 (a) How to restore your deleted or modified folders or files from Shadow 03
Copies.
(b) What is the most important legal features about digital evidence? 04
(c) What is an example of a network forensic technique? 07
OR
Q.5 (a) What information analyst could get from email header? 03
(b) Discuss techniques of hibernating files. 04
(c) Documenting the scene and evidence, maintaining the chain of custody. 07
*************
1
Seat No.: ________ Enrolment No.___________
MARKS
Q.1 (a) What is Digital forensics? 03
(b) List any four types of web attacks. How are these web attacks 04
investigated?
(c) Explain Locard’s Exchange Principle with suitable scenario. 07
1
GUJARAT TECHNOLOGICAL UNIVERSITY
BE - SEMESTER–VII (NEW) EXAMINATION – SUMMER 2024
Subject Code:3170725 Date:30-05-2024
Subject Name:Digital forensics
Time:02:30 PM TO 05:00 PM Total Marks:70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.
MARKS
Q.1 (a) What is Digital Forensics? List out uses of Digital Forensics. 03
(b) What are the 4 steps of the forensic process? Describe it. 04
(c) Explain Locard’s Exchange Principle with suitable example. 07
MARKS
Q.1 (a) What is Digital Forensic? 03
(b) List any four types of web attacks. How are these attacks 04
investigated?
(c) Explain Digital Forensic Process in brief. 07
*************
1
Seat No.: ________ Enrolment No.___________
Q.3 (a) Define Hardware and Software tools for digital forensics. 03
(b) Give the advantages of live collection. 04
(c) Discuss legal aspects and their impact on digital forensics. 07
OR
Q.3 (a) Discuss forensic cloning of evidence. 03
(b) Write a note on Electronics discovery. 04
(c) Discuss e-mail header forensic in brief. 07
*************
GVA
1
Seat No.: ________ Enrolment No.___________
Q.4 (a) What is MAC? State the main difference between MAC & Hash function. 03
(b) Explain hill cipher algorithm with example. 04
(c) Explain Message Digest Generation Using SHA-512. 07
OR
Q.4 (a) Explain the types of attacks are addressed by message authentication? 03
(b) What are the requirements for a Cryptographic Hash Function? 04
(c) Explain with the diagrams Basic Uses of Message Authentication code (MAC). 07
Q.5 (a) What is the role of Key Distribution Centre? Give the several techniques for the 03
distribution of public keys.
(b) Give the difference between Session key and Master key. 04
(c) Explain with neat diagram Digital Signature Algorithm. 07
OR
1
Q.5 (a) What is the role of AS and TGS in Kerberos? 03
(b) Draw X.509 certificate format. 04
(c) Explain SSL Architecture with neat diagram. 07
2
Seat No.: ________ Enrolment No.___________
1
Seat No.: ________ Enrolment No.___________
(b) Distinguish between passive and active security attacks? Define the type 04
of Security attack in each of the following cases:
(i) A student breaks into a professor’s office to obtain a copy of the next
day’s test.
(ii) A student gives a check for $10 to buy a used book. Later she finds
that the check was cashed for $100.
(iii) A student sends hundreds of e-mails per day to another student using
a phony return e-mail address.
(c) List and explain various block cipher modes of operation with the help of 07
diagram.
Q.2 (a) What is the purpose of S-boxes in DES? Explain the avalanche effect. 03
(b) Construct a Playfair matrix with the key “engineering”. And encrypt the 04
message “test this Balloon”.
(c) Let K = 133457799BBCDFF1 be the key in hexadecimal. Derive K1 the 07
first round sub key using a single round version of DES.
Permuted Choice One (PC-1) Permuted Choice Two (PC-2)
57 49 41 33 25 17 9 14 17 11 24 1 5 3 28
1 58 50 42 34 26 18 15 6 21 10 23 19 12 4
10 2 59 51 43 35 27 26 8 16 7 27 20 13 2
19 11 3 60 52 44 36 41 52 31 37 47 55 30 40
63 55 47 39 31 23 15 51 45 33 48 44 49 39 56
7 62 54 46 38 30 22 34 53 46 42 50 36 29 32
14 6 61 53 45 37 29
21 13 5 28 20 12 4
OR
Q.3 (a) What is a nonce? What is the difference between a session key and a 03
master key?
1
(b) Differentiate between hashing and encryption. What are the practical 04
applications of hashing?
(c) Explain Diffie Hellman key exchange algorithm with example. 07
OR
Q.3 (a) What is public key cryptography? What are the principal elements of a 03
public-key cryptosystem?
(b) Perform encryption and decryption using the RSA algorithm for p=5, 04
q=11, e=3, M=9.
(c) What do you mean by key distribution? Give at least one method for key 07
distribution with proper illustration.
Q.4 (a) Explain the triple DES scheme with two keys. 03
(b) Differentiate between Conventional encryption and Public-key 04
encryption.
(c) Discuss X.509 Certificates. 07
OR
Q.5 (a) Encrypt the message “ Asymmetric key cryptography is fun” using 03
Transposition cipher with key (3,2,6,1,5,4)
(b) Write difference between (i) block cipher and stream cipher (ii) 04
monoalphabetic cipher and polyalphabetic cipher
(c) Discuss generic model of digital signature process. 07
OR
Q.5 (a) Using the Viennese cipher, encrypt the word “explanation” using the key 03
leg.
(b) Discuss four general categories of schemes for the distribution of public 04
keys.
(c) Explain Kerberos in detail. 07
*************
2
Enrolment No./Seat No_____________
1
Seat No.: ________ Enrolment No.___________
(c) Explain playfair cipher. Encrypt the plain-text message “helloe jassmin” using 07
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any
‘j’ in the plaintext is replaced by ‘i’.)
Q.2 (a) Discuss Electronic Code Book mode and Counter mode in detail. 03
(b) Write difference between Block vs Stream Ciphers. Explain following terms 04
in context of cryptography: confusion and diffusion
(c) Explain DES round structure in detail. 07
OR
(c) Write a note on Advanced Encryption Standard(AES). 07
Q.3 (a) Write difference between conventional encryption and public-key encryption 03
(b) Explain man-in-the middle attack on Diffie-Hellman key exchange. 04
(c) Explain RSA algorithm in detail. Perform encryption and decryption using 07
RSA algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
OR
Q.3 (a) Explain following terms: Avalanche Effect, Cryptanalysis 03
(b) Discuss possible approaches to attack RSA. 04
(c) Explain the Deffie Hellman key exchange scheme in detail. In a Diffie- 07
Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and
primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is
the secret key they exchanged?
Q.4 Compare and contrast – MAC VS Encryption functions. In MAC, if 80-bit key
(a) 03
is used and the tag is 32 bits, then after how many rounds attacker will produce
a key, which must be the one used by the sender ?
(b) Explain working of Cipher-based Message Authentication Code and Data 04
Authentication Algorithm.
(c) Explain the working of Secure Hash Algorithm-512 in detail. 07
OR
Q.4 (a) Discuss three applications of hash functions. 03
1
(b) Discuss Hash function and its requirements. 04
(c) Write the algorithm for message authentication code based on HASH 07
functions. Also discuss its efficient implementation approach.
Q.5 Draw X.509 certificate format. Enlist the reasons to revoke the certificate
(a) 03
before expiry.
(b) Explain different ways to distribute symmetric key using symmetric and 04
asymmetric encryptions.
(c) Enlist requirements of Kerberos. Enlist and explain roles of various servers are 07
used in Kerberos. Explain through diagram, how Kerberos can communication
with other administrative domains for providing trusted services to the clients.
OR
Q.5 (a) Explain briefly: Linear and Differential Cryptanalysis 03
(b) Explain various general categories of schemes for the distribution of public 04
keys.
(c) Define Digital signature. Explain digital signature algorithm. 07
*************
2
Seat No.: ________ Enrolment No.___________
Q.2 (a) Encrypt the message “CORONA” using Hill Cipher with key [9 4] 03
5 7
(b) Discuss different techniques for public-key distribution. 04
(c) Elaborate DES encryption with neat sketches. 07
OR
(c) Elaborate AES encryption with neat sketches. 07
1
OR
Q.4 (a) Encrypt the message “WE ARE DISCOVERED FLEE AT ONCE” 03
using Rail fence cipher with rail = 3
(b) Explain the triple DES scheme with two keys and write about proposed 04
attacks on 3DES
(c) For Diffie-Hellman algorithm, two publically known numbers are prime 07
number 23 and primitive root (g) of it is 9. A selects the random integer
4 and B selects 3. Compute the public key of A and B. Also compute
common secret key.
Q.5 (a) Illustrate variety of ways in which MAC code can be used to provide 03
Message authentication.
(b) Consider ElGamal cryptosystem in Z17 with generator 6. If the message 04
is 13 and the randomness chosen is 10, then find the ciphertext computed
using the public key 7.
(c) Discuss X.509 authentication service. 07
*************
GVA