Semester : SEMESTER 7
Subject : Cryptography and Network Security
Year : 2019
Term : DECEMBER
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 409
Page:1
Reg No.:_ Name:
Max. Marks: 100
نم ¢ ~ >+ ~ © ~ 00 ا
5
11
12
13
14
15
a)
b)
a)
b)
a)
b)
a)
b)
G192101 Pages:2
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
Course Code: CS409
Course Name: CRYPTOGRAPHY AND NETWORKSECURITY
PARTA
Answer all questions, each carries 4 marks.
Explain confusion and diffusion properties of modern block ciphers
Differentiate between symmetric and asymmetric cryptosystem
Explain the mix column operation in AES algorithm
Compute 3° mod 7.
What are the requirements of a good hash function
How digital signature is implemented using RSA approach
What are the steps for preparing a SignedData MIME entity?
Give the format of Authentication Header in IPSec
Explain the handshake protocol in SSL
List the various attacks that can be made on packet filtering routers and mention
appropriate counter measures
PART B
Answer any two full questions, each carries 9 marks.
Use Playfair cipher to encrypt the message ‘THE HOUSE IS BEING SOLD
TONIGHT ‘ with the key ‘GUIDANCE’
Differiante between monoalphabetic and polyalphabetic ciphers with example
Explain the S-box design of DES algorithm.
Illustrate RC4 algorithm
Explain the key generation in AES algorithm
How round transformation is performed in IDEA.
PART C
Answer any two full questions,each carries 9 marks.
Explain the algorithm for generating keys in RSA algorithm. Perform encryption and
decryption using RSA Alg. for the following.. P=7; q=11; e=13; M=8
Illustrate man in the middle attack on Diffie Hellman key exchange algorithm
Illustrate the working of SHA-1 algorithm with diagram
Page lof 2
SEVENTH SEMESTER B.TECH DEGREE EXAMINATION(R&S), DECEMBER 2019
Duration: 3 Hours
Marks
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(5)
(4)
(5)
(5)
(4)
(6)
(3)
(9)