KEMBAR78
Cryptography & Network Security-TIT-701 | PDF | Cipher | Cryptography
0% found this document useful (0 votes)
243 views3 pages

Cryptography & Network Security-TIT-701

This document is a 4 page exam for a cryptography and network security course. It contains 6 questions covering various topics in cryptography including: 1) Types of ciphers like mono-alphabetic, Caesar, and transposition ciphers. 2) Cryptanalysis techniques like differential cryptanalysis and security attacks. 3) Symmetric encryption algorithms like DES and Hill cipher. 4) Asymmetric encryption using the RSA algorithm. 5) Other topics like pseudorandom number generation, MACs, digital signatures, Kerberos, and X.509 certificates.

Uploaded by

aadrika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
243 views3 pages

Cryptography & Network Security-TIT-701

This document is a 4 page exam for a cryptography and network security course. It contains 6 questions covering various topics in cryptography including: 1) Types of ciphers like mono-alphabetic, Caesar, and transposition ciphers. 2) Cryptanalysis techniques like differential cryptanalysis and security attacks. 3) Symmetric encryption algorithms like DES and Hill cipher. 4) Asymmetric encryption using the RSA algorithm. 5) Other topics like pseudorandom number generation, MACs, digital signatures, Kerberos, and X.509 certificates.

Uploaded by

aadrika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

111111111111111111111111111111

Printed Pages: 4 TlT701


~ ~:.~' (Following Paper ID and Roll No. to be filled in your Ans\\ler Book)

PAPER Ill; 0150 . ~

B.Tech
(SEM VII) ODD SEMESTER THEORY EXAMINATION 2009-10 ~.!. f

CRYPTOGRAPHY & NETWORK. SECURITY

Note:. (1) Attempt all questions.


(2) Each question carries equal marh'.

(a) What is mono-alphabetic ciphor? How it is


different from caesar cipher?

(b) Explain the principle of differential


cryptanalysis. Describe active and paSSIve
security attacks.

What is transposition cipher'! Illustrate with


.-
an example. ,_('

What is double DES? Explain the term MEET


in the middle attach ?

(e) What do you understand by Feistel cipher


structure? Explain with example.
(t) A I-till cipher uses the followin) I 'y for (b) Explain the Euler's coefficient function. State
enciphering the message. and prove Fermat's theorem.

(c) Explain RSA algorithm. Perform encryption


K=[~ ~] and decryption using RSA algorithm for
p = 17, q = 11, e = 7, M = 88.
Obtain the decryption key to be used for
deciphering the cipher text.
Attempt any two parts of the following: 10x2=20

Attempt any two parts of the following 10x2=20 (a) Explain the Pretty Good Privacy (PGP)
(a) Describe in brief IDEA encryption and algorithm. List various services supported by
decryption. Also explain. How can we generate PGP.
cryptographically secure pseudorandom
,L"
Given thatthe First 16 bits of the 128 bit
numbers?
message digest in a PGP signature are
(b) Explain the following :
translated in the clear. Explain to what extent
(i) MAC (Message Authenti~ati.on Code)
this compromises the security of the hash
(ii) HMAC (Hash based Message
algorithm.
Authentication Code) ~.
(c) What do you understand oy Elgamel
(c) Explain the Blowfish cryptographic algorithm.
encryption system? Explain its encryption
Also differentiate between differential and
linear cryptanalysis. and decription? What do you understand by
digital signature?
Attempt any two parts of the following t OX2=20

(a) Why the middle portion of triple DES In


, a decryption rather than encryption? Discuss
(a) What is Kerberos? Discuss Kerberos version
the strength of DES algorithm and ",lIso
4 in detail. What is S/MI ME and its main
explain the sub~1itution method in 'llIdilll the
functions?
P-Box? ~
././-0150 I 111I1111I1111I1111"~11111111111111111111111 :\
JJ-0150] 111111111111111111111111111111111111111111111
J J - 0 1 , II '.
2 J J 0 j II
(b) vVhat are the typical phases of an operation
of a virus or worm and how does behaviour
blocking S/W work?

(c) Give the fQrmat of X. 509 certificate showing


the important element of the certificate. Explain
the format.

rJ-0150] 111111111111111111111111111111111111111111111
J J - 0 1 , 0
4

You might also like