.
Faculty of Engmeenng and Tec/1110/0 I ' 1 , , i
g ( l'ER} , S,krhn O Anurandhan D emed tn be U11irersity
I
CEND-SEMESTER EXAMINATION, MAY-2024
ryptography & Network Security (CSE 3035)
Programme: B. Tech(CSE, CSITJ
Full Marks: 60 Semester: 6 th
Time: 3 Houra
Subject/ Course Leaming Outc_o_m_e__~ --T
- axonomy Ques. Marb
Level Nos.
-- - --- --- -- ---+- - -- ---+-------+--- -
L2 1 6
Able to understand the security
requirement, different type of security
threat and attack and the principles of
security design.
-- --- -- - - - - - - -- - - - - - . j ~ - - - - + - ---:-:--:---1-7::::---J
L2 2(a), 4(a), 10
Able to understand and implement the 6(a), 7(a) ,
most common type of cryptographic 7(c)
algorithm. L3
2(b), 3(b), 10
4(b), 4(c),
7(b)
IA 6
2(c), 3(a),
3(c),
5 6
Able to apply modem algebra and
L3
number theory for understanding of
6(a), 6(b) 4
cryptographic algorithms and
vulnerabilities.
Able to understand the most common L2 8(a), 8(b) 6
asymmetric type of cryptographic
algorithm used in current scenario. L3 8(c)
Able to evaluate security mechanism in L2 9 6
message authentication code using
HASH function.
12 10 6
Able to demonstrate various network
security applications.
l - - - - - : - - - - - - - ---,;·--;- ·· - ·- - - ~ - - - ----L---------'1---___,
'Bloom's taxonomy levels: Remembenng (LI), Understanding (L2),
Application (L3), Analysis (L4), Evaluation (LS), Creation (L6
page 1 of 4
Answer all questi ons. Each questi on carrie s equal mark.
2
Briefly explai n the key o~jecti ves of inform ation and netwo rk
1. (a)
securit y. 2
(b) Briefly explai n differe nt ways an oppon ent_ tries to m~e an
attack for stealin g/ modifying the inform ation comm unicat ed
between two hosts in a secure d compu ter netwo rk.
(c) As a securi ty design er list out the challe nges to be handl ed to 2
mainta in compu ter securi ty.
State the impor tance of crypta nalysi s in the field of 2
2. (a)
crypto graphy . Briefly explai n how brute force attack helps
oppon ent in the proces s of crypta nalysi s.
2
(b) If for a given key the plainte xt and cipher text pair using Caesa r
cipher is (P=party, C=SDUWB), then using the same key
encryp~ the messa ge "crypt ograph y and netwo rk securi ty".
2
(c) Decry pt "TG~DUCH_ HOTL LSl!O.~ !\GC QRHK SHG", which
was formed using a simple monoa lphabe tic substi tution cipher
with the keywo rd "1,P_PALACHIAN STATE".
3. (a) If plain text and cipher text pair using playfa ir metho d is 2
P = EDERl3HTFRBATEC
C = ~LMT ISHBI THGD
then compl cte the 5 x 5 matrix :
'
I
I ,
-T' .. 1 "
v- ~ _)
--- ,,
B C D
F H L:J K M
N 0 p Q u
·- ' - -
r·+ w X y z
/i Determ ine the key matrix of. size 2 x 2 from the enc
messa ge "FKMFIO" of the plain text "attack ".(usin g Hill
ted
ci:Cr )
2
€) Let's consider the Cipher text
TEFETEOAAT". Using the Rail Fence
2
"~~MATRHTGPRy_E
Cipher , find out the plainte xt for key value 2.
Page 2 of 4
Draw the inter nal struc ture for the singl e roun d of 2
4. Ja) DES
algor ithm.
In DES encry ption , the 64-b it outp ut of roun d 16 2
(b) 1s
(6821 345A C821 _305A)111·,x 1• Find t he 64 -bit inpu t to inver
se
initia l perm utati on stage .
(c) Using the Fiest el ciphe r struc ture that uses only two roun 2
?s
gene rate the ciphe rtext (in Hexa decim al form) for the 16
bits
plain text "1AC 8" (in Hexa decim al form) . Assu me the
roun d
funct ion as logic OR opera tion and the subk eys for roun d
1, 2 ,
3 are "34", "56", ''13" (in Hexa decim al form) respe ctive ly.
s. .-(a) Calcu late (1234 1) Mod 5771 3 2
,(b) Exam ine with relev ant re~so n whet her the set Zs of integ ers 2
{O, 1, 2, 3, 4, 5, 6, 7} with 1the arith meti c oper ation s modu lo
8 is
a field or not. '
. (c) f(x) = (x6 + x 4 + x3+ x2 + 1)., g(x) = (x7 + x + 1) and m(x) = (x8
+ x4 2
+ x3 + x + 1) calcu late: (i) f(x) + g(x) (ii) f(x).g(x) mod
m(x) for
GF( 28)
6. (a) Expl ain the meet -in--t he midd le attac k of mult iple encry ption
s. 2
(b) Usin g Linea r Cong ruent ial Gene rator s, gene rate 5 rand om
bits 2
for modu lus m=12 7, multi plier a=7, incre ment c=2, seed xo=8
7.
(c) Gene rate 5 rand om bits tising Blum Blum Shub Gene rator
for 2
p=38 3, q=50 3, and seed xo=1 9264 9.
7. (a) Expl ain the four diffe rent stage s of AES trans form ation 2
funct ions with suita ble diagr am.
(b) In AES, calcu late the first colum n of outp ut state matr ix of
add 2
roun d key trans form ation for the given inpu t:
63 EB 9F AO 29 57 40 1A
co 2F 93 92 C3 1 14 22 02
AB 30 AF C7 50 20 99 07
20 CB 2B A2 SF FG 83 3A
(Inpu t to add round
(Rou nd key)
key transf ormat ion)
(c) Expl ain AES key expa nsion proc ess with suita ble diagr am
.
2
S. (a) In terms of secret key, how public key encryption is different 2
fro1n convenbonal encryption. What are the applications of
public key cryptosystem in information security?
(b) Name the SD{ ingredients of public key encryption. With 2
suitable diagram explain encryption with public key
(c) In a RSA cryptosystem , A uses two prime numbers p = 2 and 2
q =11 to generate her public and private keys. If the public
key of A is 7, what is the private key of A?
9• (a) lliustrate two ways in which a HASH function can be used for 2
message authenticatio n.
(b) EA-plain with diagram how MAC can be used for message 2
authenticatio n and confidentiality.
(c) List and explain the top web security threats. 2
10 (a) Explain the key factors contributing to the higher security risk 2
of wireless networks compared to wired networks.
(b) List and briefly describe the security treats to wireless 2
networks.
(c) Explain Wireless Security measures dealing with wireless 2
transmission s, wir~less access points, and wireless networks.
*End of Questions*