0% found this document useful (0 votes)
16 views1 page

Paper Id: Roll No: B. Tech. (Sem Vii) Theory Examination 2019-20 Cryptography & Network Security

The document outlines the structure of a B. Tech. theory examination for Cryptography & Network Security, including various sections with questions on topics such as cipher text, RSA algorithm, digital signatures, and security protocols. It consists of multiple-choice and descriptive questions aimed at assessing students' understanding of cryptographic principles and network security. The exam is designed to cover a wide range of topics within the field, ensuring a comprehensive evaluation of the students' knowledge.

Uploaded by

Mohammad Umair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views1 page

Paper Id: Roll No: B. Tech. (Sem Vii) Theory Examination 2019-20 Cryptography & Network Security

The document outlines the structure of a B. Tech. theory examination for Cryptography & Network Security, including various sections with questions on topics such as cipher text, RSA algorithm, digital signatures, and security protocols. It consists of multiple-choice and descriptive questions aimed at assessing students' understanding of cryptographic principles and network security. The exam is designed to cover a wide range of topics within the field, ensuring a comprehensive evaluation of the students' knowledge.

Uploaded by

Mohammad Umair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Printed Page 1 of 1 Sub Code:NIT701

Paper Id: 113711 Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

B. TECH.
(SEM VII) THEORY EXAMINATION 2019-20
CRYPTOGRAPHY & NETWORK SECURITY
Time: 3 Hours Total Marks: 100
Note: Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
1. Attempt all questions in brief. 2 x 10 = 20
a. Define cipher text with the help of an example.
b. Categorize Passive and Active attack.
c. State Fermat’s theorem.
d. Write any two applications of RSA algorithm.
e. What type of security goals are used in cryptography?

om
f. Explain briefly two approaches of Digital Signature.
g. List any two applications of X.509 Certificates.
h. Write a simple Authentication dialogue used in Kerberos.

c
i. Define S/MINE.
j. What are the protocols used to provide IP security?

s.
SECTION B
2. Attempt any three of the following: 10x3=30
a.
b.
on
Draw the block diagram of DES encryption.Also Explain strength of DES in brief.
What are the securities of RSA? Perform encryption and decryption using RSA algorithm
for p = 17, q = 11, e = 7, m = 88
iti
c. Explain SHA-512 algorithm with a neat diagram.
d. Give the structure of PGP message generation. Explain with a diagram.
ttu

e. Write short notes on any two of the following:


(i) Secure Socket Layer, (ii) Modes of IP Sec, (iii) Intrusion Detection.
SECTION C
3. Attempt any one part of the following: 10x1=10
en

a. Differentiate between following:


(i) Block cipher and Stream Cipher
(ii) Steganography and Cryptography
om

(iii) Authentication and Authorization


b. Explain Shannon’s theory of confusion and diffusion in terms of information security.
4. Attempt any one part of the following: 10x1=10
a. Illustrate the concept of Chinese remainder theorem. By using Chinese Remainder Theorem
m

solve the simultaneous congruence X ≡ 2mod P for all P ∈ {3,5,7}


b. What is the application of public key cryptosystems? Discuss the applications for public key
cryptosystems.
st

5. Attempt any one part of the following: 10x1=10


a. Describe signing and verification in Digital Signature Algorithm.
la

b. What are the requirements of a Message Authentication code (MAC)? Discuss the logical
structure, components and algorithmic steps of MD5 algorithm.
6. Attempt any one part of the following: 10x1=10
a. Explain Diffie-Helman key exchange technique with an example.
b. What is Kerberos? Discuss the principle differences between version 4 and version 5 of
Kerberos.
7. Attempt any one part of the following: 10x1=10
a. List the participants in SET (Secure Electronic Transaction) system? Describe in brief the
sequence of events that are required for a transaction.
b. What are different types of firewall? Also discuss viruses and related threats to system
security

Page 1 of 1

You might also like