0% found this document useful (0 votes)
23 views2 pages

CNS (KCS074) Pue 2022-23

This document outlines the examination structure for the Cryptography & Network Security course at KIET Group of Institutions, detailing the sections, types of questions, and marking scheme. It includes various questions related to key principles of security, cryptographic algorithms, and security protocols. The exam is designed to assess students' understanding and application of cryptographic concepts and techniques.

Uploaded by

rocksneha43
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views2 pages

CNS (KCS074) Pue 2022-23

This document outlines the examination structure for the Cryptography & Network Security course at KIET Group of Institutions, detailing the sections, types of questions, and marking scheme. It includes various questions related to key principles of security, cryptographic algorithms, and security protocols. The exam is designed to assess students' understanding and application of cryptographic concepts and techniques.

Uploaded by

rocksneha43
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Annexure- 19 (a)

Roll No. ___________________


KIET Group of Institutions
PUE (2023-2024) ODD Semester

Department: Computer Science & Engineering Course: B.Tech


Year: 4th Semester:7th
Subject Name: Cryptography & Network Security Subject Code:KCS074
Duration: 3 Hrs Max. Marks: 100
Note: Attempt all the questions of each section
Section-A (2X10=20)
Q. 1 Competitive Exam# CO BL/ KC*
a Outline the key principles of security. 1 1F/C
Using public key cryptography, X adds a digital signature σ to
message M, encrypts, and sends it to Y, where it is decrypted. GATE CSE 2013
b 1 2F/C
Write down the sequences of keys used for the operations
(encryption and decryption).
c Explain Shannon Confusion and Diffusion. 2 3F/C
d Find gcd (1970, 1066) using Euclid’s algorithm. 2 3F/C
e Explain Birthday attack. 3 3F/C
f Discuss Public Key Infrastructure (PKI). 3 1F/C
g Discuss the potential security issues that arise due to public key
4 1F/C
directory-based system.
h Explain E-mail security. 4 1F/C
i Identify the benefits of IP Security. 5 1F/C
j Discuss various types of firewalls and its design goal. 5 1F
Section-B (6X5=30)
Determine the difference between Substitution and Transposition
techniques with the help of suitable example.
OR
Q. 2 1 3F/C
Apply play fair cipher using the keyword MONARCHY to encrypt
the plain text “Cryptography is my favorite subject”. Use X for
blank spaces.
Illustrate Extended Euclidian Algorithm. Find the multiplicative
inverse of 107 modulo 141.
Q. 3 OR 2 3F/C
Apply RSA algorithm to perform encryption and decryption for
p=17, q=11,e=7 m=88 and compute corresponding cipher text.
Discuss the properties of hash functions? Explain what
characteristics are needed in a secure Hash Function.
Q. 4 OR 3 2C
Explain the concept of MAC. Discuss working of MAC with
suitable block diagram.
Illustrate the various services supported by S/MIME. Explain how
S/MIME supports these services.
Q. 5 OR 4 3C
Determine the role of X.509 certificate in cryptography. Discuss
X.509 certificate in detail.
Discuss transport mode and tunnel mode authentication in IP?
Describe how ESP is applied to both these modes.
Q. 6 OR 5 2F/C
Discuss the difference between SSL connection and SSL session?
Discuss SSL protocol architecture.
Section-C (10X5=50)
Annexure- 19 (a)
Roll No. ___________________
Illustrate the DES algorithm with the help of block diagram. List
the strength of DES. Discuss the requirement of Double and Triple
DES.
Q. 7 1 4C/P
OR
Explain the concept of block cipher and stream cipher in
cryptography? Discuss the modes of operation of block cipher.
Evaluate the private key of A in a RSA cryptosystem. Where, a
particular A uses two prime numbers p = 13 and q =17 to generate
her public and private keys.
OR
Q. 8 Justify the concept of Chinese Remainder Theorem by solving the 2 5C/P
following congruent equations:
i. X ≡ 2 mod 3
ii. X ≡ 3 mod 5
iii. X=2 mod 7
Illustrate the idea of Digital Signature for authentication. Discuss
signing & verifying process of Digital Signature Algorithm (DSA)
in detail with suitable steps.
Q. 9 3 4C
OR
Explain Hash Function? Discuss SHA- 512 with all required steps,
round function & block diagram.
Users Alice and Bob use the Diffie-Hellman key exchange
technique with a common prime q = 83 and a primitive root α = 5.
i)If Alice has a private key XA = 6, compute Alice’s public key
YA?
ii) If Bob has a private key XB = 10, compute Bob’s public key
Q. 10 YB? 4 3C/P
iii)Construct the shared secret key
OR
Illustrate the full-service Kerberos environment. Also, determine
the principal differences between version 4 and version 5 of
Kerberos
Discover the need of IP security. Illustrate the role of AH and ESP.
OR
Q. 11 5 3F/C
Determine the process of secure electronic transaction (SET)
protocol that enables e-transactions. Explore all its components.

● CO -Course Outcome generally refer to traits, knowledge, skill set that a student attains after completing the course successfully.
● Bloom’s Level (BL) - Bloom’s taxonomy framework is planning and designing of assessment of student’s learning.
● *Knowledge Categories (KCs): F-Factual, C-Conceptual, P-Procedural, M-Metacognitive
● #Reference to Competitive Exams (GATE, GPAT, CAT, GRE, TOFEL, NET, etc. )

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy