0% found this document useful (0 votes)
22 views2 pages

Gujarat Technological University

This document outlines the examination details for the Cryptography and Network Security subject at Gujarat Technological University, including the date, time, and total marks. It contains instructions for the exam, a series of questions covering various topics in cryptography, and options for alternative questions. The exam assesses knowledge on security principles, encryption methods, algorithms, and key management.

Uploaded by

Om Dabhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Gujarat Technological University

This document outlines the examination details for the Cryptography and Network Security subject at Gujarat Technological University, including the date, time, and total marks. It contains instructions for the exam, a series of questions covering various topics in cryptography, and options for alternative questions. The exam assesses knowledge on security principles, encryption methods, algorithms, and key management.

Uploaded by

Om Dabhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Enrolment No.

/Seat No_____________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE - SEMESTER–VI (NEW) EXAMINATION – SUMMER 2024
Subject Code: 3161606 Date:17-05-2024
Subject Name: Cryptography and Network security
Time: 10:30 AM TO 01:00 PM Total Marks:70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
4. Simple and non-programmable scientific calculators are allowed.

MARKS

Q.1 (a) Define the following aspects of security. 03


(i)Security Attack (ii) Security Mechanism (iii) Security Service
(b) Differentiate passive attack from active attack with example. 04
(c) Encrypt the text “SWARAJ IS MY BIRTH RIGHT” using play 07
fair cipher using the keyword MONARCHY.

Q.2 (a) Find gcd(1970, 1066) using Euclidean algorithm 03


(b) Discuss the properties that are satisfied by Groups, Rings and 04
Fields.
(c) Explain Confidentiality, Integrity and Availability as basic 07
security principles with example.
OR
(c) Demonstrate encryption using Hill Cipher with suitable example. 07

Q.3 (a) What are the differences between diffusion and confusion? 03
(b) Convert the Given Text “CRYPTOGRAPHY” into cipher text 04
using Rail fence cipher.
(c) What are the different modes of operation in Block Cipher? Explain 07
any three of them with diagram.
OR
Q.3 (a) Identify the any three possible threats for RSA algorithm and list 03
their counter measures.
(b) Explain the Key Generation process of DES algorithm using 04
example.
(c) Elaborate double DES process. What are disadvantages of double 07
DES

Q.4 (a) Why is asymmetric cryptography bad for huge data? Specify the 03
reasons.
(b) Explain the key management of public key encryption in detail? 04
(c) Perform encryption and decryption using RSA Algorithm for 07
the following. P=17; q=11; e=7; M=88.
OR
Q.4 (a) What is the difference between public key and private key 03
cryptosystem?
(b) Explain Digital signature with example. 04
1
(c) Demonstrate the Substitute byte transformation in AES with 07
example.

Q.5 (a) Describe importance of the SSL Architecture. 03


(b) Define Kerberos. Derive the Kerberos procedure, If the client C 04
wants to communicate server S.
(c) Analyze and explain Diffie Hellman key exchange algorithm with 07
its merits and demerits.
OR
Q.5 (a) List any two applications of X.509 Certificate. 03
(b) Explain about MD5 algorithm in detail. 04
(c) Compare and Draw diagram of RSA Approach and DSS 07
Approach Digital Signature.
*******************

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy