P.E.S.
College of Engineering, Mandya
(An Autonomous Institution affiliated to VTU, Belagavi)
Seventh Semester, B.E .-Electronics and Communication
Cryptography and Network Security (P21EC7022)
MODEL QUESTION PAPER
---------------------------------------------------------------------------------------------------------------------------------------------------------------
Note: i) Part – A is compulsory, One question from each unit
ii) Part – B: Part – B: Answer any sub questions for Max .of 18 marks from each unit.
Q. No. Questions Marks Bloom’s
Taxonomy
PART – A 10 BL CO PO
Unit – I to V
a Consider a Caesar Cipher method write an appropriate equations for 2 2 1 1
plain text and cipher text.
b What are the basic principles of public key crypto systems. 2 2 1 1
c List and briefly explain application of cryptographic Hash functions 2 2 2 1
d Compare between SSL connection and an SSL session 2 2 2 1
e Summarize the key functional components of the Internet mail 2 2 1 1
architecture.
PART – B 90
Unit – I 18
1 a Encrypt the message “meet me at the usual place at ten rather than eight 9 4 2 1,2
o’clock” using the Hill cipher. Show your calculations and the result.
Key =
b Illustrate the overview of Data encryption Standard with necessary 9 2 2 2
diagram and highlights its operations.
c Describe the four types of transformation functions used in AES. 9 2 2 2
Unit – II 18
2 a In a public key system, using RSA algorithm you intercept the cipher 9 4 2 2
text C = 10 sent to a user whose public key is e = 5, n = 35. Perform
decryption to recover the Plain text M and also compute user’s private
key.
b Explain and compare how Diffie-Hellman key exchange algorithm 9 3 2 2
useful in evaluate Man-in-the-Middle Attack concept.
c Consider an ElGamal scheme with a common prime q = 71 and a 9 4 2 2
primitive root α = 7.
a. If B has public key YB = 3 and A chose the random integer k = 2, what
is the ciphertext of M = 30?
b. If A now chooses a different value of k so that the encoding of M = 30
is C = (59, C2), what is the integer C2?
Unit – III 18
3 a Summarize the applications of cryptographic hash functions 9 3 3 2,3
b Briefly explain the HMAC algorithm 9 2 2 2
c Interpret the working of Elgamal Digital Signature scheme. 9 2 3 2,3
Unit – IV 18
4 a Interpret are the primary security risks associated with cloud computing. 9 2 3 2,3
b Explain ESP packet format. 9 3 3 2,3
c Explain the concept of transport and tunnel modes. 9 2 3 2,3
Unit – V 18
a Summarize the benefits and applications of IPsec. 9 2 2 2
b Illustrate the IP traffic processing for outbound and inbound packets. 9 2 3 2,3
5
c Explain with neat diagram the key components Internet Mail 9 3 2 2
Architecture.