APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY Previous Years Question Paper & Answer

Course : B.Tech

Semester : SEMESTER 7

Year : 2019

Term : DECEMBER

Scheme : 2015 Full Time

Course Code : CS 409

Page:1





PDF Text (Beta):

Reg No.:_ Name:

Max. Marks: 100

نم ¢ ~ >+ ~ © ~ 00 ا

5

11

12

13

14

15

a)

b)
a)
b)
a)
b)

a)

b)

G192101 Pages:2

APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY

Course Code: CS409
Course Name: CRYPTOGRAPHY AND NETWORKSECURITY

PARTA
Answer all questions, each carries 4 marks.

Explain confusion and diffusion properties of modern block ciphers
Differentiate between symmetric and asymmetric cryptosystem
Explain the mix column operation in AES algorithm
Compute 3° mod 7.
What are the requirements of a good hash function
How digital signature is implemented using RSA approach
What are the steps for preparing a SignedData MIME entity?
Give the format of Authentication Header in IPSec
Explain the handshake protocol in SSL
List the various attacks that can be made on packet filtering routers and mention
appropriate counter measures

PART B

Answer any two full questions, each carries 9 marks.

Use Playfair cipher to encrypt the message ‘THE HOUSE IS BEING SOLD
TONIGHT ‘ with the key ‘GUIDANCE’
Differiante between monoalphabetic and polyalphabetic ciphers with example
Explain the S-box design of DES algorithm.
Illustrate RC4 algorithm
Explain the key generation in AES algorithm
How round transformation is performed in IDEA.

PART C

Answer any two full questions,each carries 9 marks.

Explain the algorithm for generating keys in RSA algorithm. Perform encryption and

decryption using RSA Alg. for the following.. P=7; q=11; e=13; M=8

Illustrate man in the middle attack on Diffie Hellman key exchange algorithm

Illustrate the working of SHA-1 algorithm with diagram

Page lof 2

SEVENTH SEMESTER B.TECH DEGREE EXAMINATION(R&S), DECEMBER 2019

Duration: 3 Hours

Marks
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)

(4)

(5)
(4)
(5)
(5)
(4)

(6)

(3)
(9)

Similar Question Papers