B 1000csT433122204
Reg No.:
APJ ABDUL KAL$M TECHNOLOGICAL UNIV
Seventh Semester B.Tech Degree (S, FE) ExaminationMay 2024
Course Code: CST433
Course Name: SECURITY IN COMPUTING
Max. Marks: 100 Duration: 3 Hours
PART A
Answer all questions, each carries 3 marks. Marks
Explain the terms: Cryptography, Cryptanalysis (3)
Alice wishes to send the message "CoME EARLY" to Bob, using Playfair cipher. (3)
The key to be used is "DOLLARS". Show the process of encryption.
J Compare stream cipher and Block cipher with example. (3)
4 DES?
What is the purpose of S Box in (3)
5 Compare symmetric and asymmetric cryptosystems. (3)
6 Consider an ElGamal scheme with a common prime q:71 and a primitive root o (3)
: 7. If B has a public key YB : 3 and A chose the random number k:2, what is
the ciphertext of the message M:30?
7 Differentiate Message Authentication Code and Hash function. (3)
t
8 What are the properties of Digital Signature? (3)
9 List any two ways in which secret keys can be distributed to two communicating (3)
parties.
l0 Mention the phases of operation of a virus. (3)
PART B I
Answer any onefull questionfrom eatii module, each carries 14 marks.
Module I
ll a) What is meant by transposition cipher? Explain rail fence cipher and row (7)
transposition ciphers with example.
b) Explain various types of security attacks. (7)
OR
12 a) Define Security attacks, security mechanism, security services (e)
b) Differentiate between monoalphabetic ciphers and polyalphabetic ciphers and (5)
give one example for each.
Page 1of2
',. , .. 1000CST433122204
Module ll
13 a) Explain the design of DES algorithm. (e)
b) Describe about Counter Mode of operation. (5)
OR
14 a) Explain AES Algorithm in details. (10)
b) How is meet in the middle attack done in 2-DES? (4)
Module lll
15 a) Explain RSA cryptosystem. In an RSA cryptosystem a participant A uses two (8)
prime numbers p:l3 and q:l7 to generate public key and private key. The public
' key of A is 35. Find the private key of A.
b) What are the roles of the public and private key in Public Key Cryptosystem. (6)
Explain how we ensure authentication and confidentiality in Public Key
Cryptosystem
OR
l6 a) Explain Diffie-Hellman Key Exchange algorithm with its merits and demerits. (e)
b) Discuss the key exchange procedure using Elliptic Curves. (s)
Module lV
t7 a) Describe the steps in finding the message digest using SHA-512 algorithm. (10)
b) Describe the digital signature standard DSS. (4)
OR
l8 a) Describe about HMAC. (8)
b) Explain three dif.ferent Arbitrated Digital Signature Techniques. (6)
Module V
l9 a) Explain different types of Simple DDoS a{ack and its countermeasures. . (6)
b) Differentiate between statistical anomaly detection and rule-based intrusion (8)
detection.
OR
20 a) Explain the types of Intrusion Detection Systems. (8)
b) Explain four techniques used to avoid guessable passwords. (6)
Page2of2