0% found this document useful (0 votes)
49 views3 pages

(CS6701 PTCS6701)

This document contains details of a question paper for a Cryptography and Network Security examination. It includes 3 parts - Part A contains 10 short answer questions, Part B contains 5 long answer questions worth 13 marks each, and Part C contains 1 question worth 15 marks. The questions cover topics like active vs passive attacks, public key cryptosystems, hash functions like SHA and MD5, encryption algorithms like AES, authentication protocols like Kerberos, and ciphers like Playfair cipher.

Uploaded by

Russian Carxgame
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views3 pages

(CS6701 PTCS6701)

This document contains details of a question paper for a Cryptography and Network Security examination. It includes 3 parts - Part A contains 10 short answer questions, Part B contains 5 long answer questions worth 13 marks each, and Part C contains 1 question worth 15 marks. The questions cover topics like active vs passive attacks, public key cryptosystems, hash functions like SHA and MD5, encryption algorithms like AES, authentication protocols like Kerberos, and ciphers like Playfair cipher.

Uploaded by

Russian Carxgame
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Reg. No.

Question Paper Code : 70395

B.E./B.Tech. DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2021.

Seventh/Eighth Semester
Computer Science and Engineering
CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
(Regulation 2013)
(Common to Information Technology/Electronics and Communication Engineering)
(Also Common : PTCS 6701 – Cryptography and Network Security for B.E.
(Part – Time) – Sixth Semester – Computer Science and Engineering)

(Regulations 2014)

Time : Three hours Maximum : 100 marks

Answer ALL questions.

PART A — (10  2 = 20 marks)

1. Compare active and passive attack.

2. Find gcd (1970, 1066) using Euclid's algorithm.

3. Give the applications of the public key cryptosystem.

4. What are primitive operations used in RC5?

5. What are the requirements for message authentication?

6. Show how SHA is more secure than MD5.

7. Define the roles of firewalls.

8. State the difference between threats and attacks.

9. What are the services provided by PGP?

10. Differentiate transport and tunnel mode in IPSec.


PART B — (5  13 = 65 marks)

11. (a) (i) What is steganography? Describe the various techniques used in
steganography. (7)

(ii) What is monoalphabetic cipher? Examine how it differs from


Caesar cipher. (6)

Or

(b) Explain the network security model and its important parameters with a
neat block diagram.

12. (a) What do you mean by AES ? Diagrammatically illustrate the structure of
AES and describe the steps in AES encryption process with example.

Or

(b) With a neat sketch explain the Elliptic curve cryptography with an
example.

13. (a) How Hash function algorithm is designed ? Explain their features and
properties.

Or

(b) With a neat diagram, explain the MD5 processing of a single 512 bit
block.

14. (a) (i) What is Kerberos? Explain how it provides authenticated service. (7)

(ii) Explain the format of the X.509 certificate. (6)

Or

(b) Explain the various types of firewalls with neat diagrams.

15. (a) Explain in detail about S/MIME.

Or

(b) Describe in detail about SSL/TLS.

2 70395
PART C — (1 × 15 = 15 marks)

16. (a) (i) Explain briefly about Diffie Hellman key exchange algorithm with
its merits and demerits. (10)

(ii) Explain public key cryptography and when it is preferred? (5)

Or

(b) Solve using playfair cipher method. Encrypt the word "Semester Result"
with the keyword "Examination". Discuss the roles to be followed.

—————————

3 70395

You might also like