Semester : SEMESTER 7
Subject : Cryptography and Network Security
Year : 2021
Term : DECEMBER
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 409
Page:2
12
13
14
15
16
17
18
19
a)
b)
a)
b)
a)
b)
a)
a)
b)
a)
b)
a)
b)
a)
b)
10000CS409122002
Explain how round transformation is performed in IDEA.
Illustrate key scheduling algorithm and pseudo random generation algorithm in
RC4.
Explain the transformations of AES with suitable examples.
Using vigenere cipher encrypt the message “she is listening” using the key
word “pascal’’.
PART ^
Answer any two full questions, each carries 9 marks.
In an RSA cryptosystem user A uses two prime numbers p=13 and q=17 to
generate private and public keys. If the public key of A is 35,calculate the
private key of A.
Explain Diffie-Hellman key exchange algorithm with suitable example.
Explain the working of SHA-1 secure hash algorithm.
Explain the key generation, signing and verification of DSA digital signature
algorithm.
Give the encryption/decryption procedures using Elliptic Curve Cryptography.
PART D
Answer any two full questions, each carries 12 marks.
Discuss the format of transmitted message of PGP.
Explain Oakley key determination protocol for IPSec.
Explain SSL record protocol services and operations.
Write notes on various types of firewalls.
Explain the role of Security Association and SA selectors in IPSec.
Explain the phases of SSL handshake protocol with diagram.
Page 2 of 2
(5)
(4)
(6)
(3)
(4)
(5)
(9)
(5)
(4)
(6)
(6)
(6)
(6)
(6)
(6)