Seat No: ______________ Enrollment No: ____________________
PARUL UNIVERSITY
FACULTY OF ENGINEERING & TECHNOLOGY
B.Tech. Winter 2023 - 24 Examination
Semester: 5 / 7 Date: 20/11/2023
Subject Code: 203105310 Time: 10:30am to 1:00pm
Subject Name: Information and Network security Total Marks: 60
Instructions:
1. All questions are compulsory.
2. Figures to the right indicate full marks.
3. Make suitable assumptions wherever necessary.
4. Start new question on new page.
Q.1 Objective Type Questions - ( Fill in the blanks, one word answer, MCQ-not more (15)
than Five in case of MCQ) (All are compulsory) (Each of one mark)
1. Which part of the OSI model is responsible for ensuring data confidentiality and
integrity?
a) Physical layer b) Data link layer
c) Transport layer d) Presentation layer
2. The Caesar Cipher is an example of a _______________ encryption technique.
a) Symmetric b) Asymmetric
c) Hybrid d) None of the above
3. The Data Encryption Standard (DES) uses a ____________-bit key for
encryption.
a) 56 b) 128
c) 64 d) 256
4. What cryptographic principle is responsible for making small changes in the
input result in significant changes in the output in block ciphers?
a) Confusion b) Diffusion
c) Substitution d) Permutation
5. The RSA algorithm is an example of a _______________ encryption technique.
a) Symmetric b) Asymmetric
c) Hybrid d) None of the above
6. The process of converting ciphertext back into plaintext without knowing the
key is called _______________.
7. In the Hill Cipher, the key is represented as a _______________ matrix.
8. The Avalanche Effect ensures that a small change in the plaintext results in a
_______________ change in the ciphertext.
9. The Advance Encryption Standard (AES) uses _______________ rounds of
encryption.
10. In asymmetric encryption, the _______________ key is used for encryption, and
the _______________ key is used for decryption
11. Explain the concept of a Man-in-the-Middle (MitM) attack in asymmetric
cryptography.
Page 1 of 2
12. What is the purpose of a cryptographic hash function, and what are the security
requirements for such functions?
13. Describe the differences between Electronic Code Book (ECB) mode and Cipher
Block Chaining (CBC) mode in block ciphers
14. Briefly explain the concept of a "Monoalphabetic Cipher" and provide an example
15. Define "Steganography"
Q.2 Answer the following questions. (Attempt any three) (15)
A) Describe the principles of the Diffie-Hellman Key Exchange algorithm.
B) Explain the concept of avalanche effect in cryptographic algorithms
C) Provide an overview of the principles of firewall technology in computer security.
D) Explain single round of DES algorithm in detail.
Q.3 A) Explain the RSA algorithm with an example. (07)
B) Compare and contrast block ciphers and stream ciphers. Explain the principles of (08)
block ciphers, emphasizing the concepts of confusion and diffusion
OR
B) Analyze the Data Encryption Standard (DES) and its strength. Discuss the design (08)
principles of block ciphers and the key factors that contributed to the security of DES.
Q.4 A) Define and explain message authentication codes (MACs) and their significance in (07)
ensuring data integrity.
OR
A) Introduce the concept of digital signatures. Explain how digital signatures work, (07)
their applications, and the Digital Signature Standard (DSS).
B) Explain the importance of key management in cryptographic systems. Discuss (08)
symmetric and asymmetric key distribution methods, including their advantages and
disadvantages.
Page 2 of 2