Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views4 pages

Cryptography Endsem 2024 6th Sem

This document outlines the structure and content of the CSE 3035 Cryptography & Network Security exam for B. Tech students in their 6th semester, scheduled for May 2024. It details the learning outcomes, question distribution, and marks allocation across various topics related to security principles, cryptographic algorithms, and network security applications. The exam consists of multiple questions requiring understanding and application of cryptographic concepts, algorithms, and security measures.

Uploaded by

Amaresh Swain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

Cryptography Endsem 2024 6th Sem

This document outlines the structure and content of the CSE 3035 Cryptography & Network Security exam for B. Tech students in their 6th semester, scheduled for May 2024. It details the learning outcomes, question distribution, and marks allocation across various topics related to security principles, cryptographic algorithms, and network security applications. The exam consists of multiple questions requiring understanding and application of cryptographic concepts, algorithms, and security measures.

Uploaded by

Amaresh Swain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

.

Faculty of Engmeenng and Tec/1110/0 I ' 1 , , i


g ( l'ER} , S,krhn O Anurandhan D emed tn be U11irersity
I
CEND-SEMESTER EXAMINATION, MAY-2024
ryptography & Network Security (CSE 3035)
Programme: B. Tech(CSE, CSITJ
Full Marks: 60 Semester: 6 th
Time: 3 Houra

Subject/ Course Leaming Outc_o_m_e__~ --T


- axonomy Ques. Marb
Level Nos.
-- - --- --- -- ---+- - -- ---+-------+--- -
L2 1 6
Able to understand the security
requirement, different type of security
threat and attack and the principles of
security design.

-- --- -- - - - - - - -- - - - - - . j ~ - - - - + - ---:-:--:---1-7::::---J
L2 2(a), 4(a), 10
Able to understand and implement the 6(a), 7(a) ,
most common type of cryptographic 7(c)
algorithm. L3
2(b), 3(b), 10
4(b), 4(c),
7(b)
IA 6
2(c), 3(a),
3(c),

5 6
Able to apply modem algebra and
L3
number theory for understanding of
6(a), 6(b) 4
cryptographic algorithms and
vulnerabilities.
Able to understand the most common L2 8(a), 8(b) 6
asymmetric type of cryptographic
algorithm used in current scenario. L3 8(c)

Able to evaluate security mechanism in L2 9 6


message authentication code using
HASH function.

12 10 6
Able to demonstrate various network
security applications.
l - - - - - : - - - - - - - ---,;·--;- ·· - ·- - - ~ - - - ----L---------'1---___,
'Bloom's taxonomy levels: Remembenng (LI), Understanding (L2),
Application (L3), Analysis (L4), Evaluation (LS), Creation (L6
page 1 of 4
Answer all questi ons. Each questi on carrie s equal mark.
2
Briefly explai n the key o~jecti ves of inform ation and netwo rk
1. (a)
securit y. 2
(b) Briefly explai n differe nt ways an oppon ent_ tries to m~e an
attack for stealin g/ modifying the inform ation comm unicat ed
between two hosts in a secure d compu ter netwo rk.

(c) As a securi ty design er list out the challe nges to be handl ed to 2


mainta in compu ter securi ty.

State the impor tance of crypta nalysi s in the field of 2


2. (a)
crypto graphy . Briefly explai n how brute force attack helps
oppon ent in the proces s of crypta nalysi s.
2
(b) If for a given key the plainte xt and cipher text pair using Caesa r
cipher is (P=party, C=SDUWB), then using the same key
encryp~ the messa ge "crypt ograph y and netwo rk securi ty".
2
(c) Decry pt "TG~DUCH_ HOTL LSl!O.~ !\GC QRHK SHG", which
was formed using a simple monoa lphabe tic substi tution cipher
with the keywo rd "1,P_PALACHIAN STATE".

3. (a) If plain text and cipher text pair using playfa ir metho d is 2
P = EDERl3HTFRBATEC
C = ~LMT ISHBI THGD
then compl cte the 5 x 5 matrix :
'
I
I ,
-T' .. 1 "
v- ~ _)
--- ,,
B C D

F H L:J K M

N 0 p Q u
·- ' - -

r·+ w X y z

/i Determ ine the key matrix of. size 2 x 2 from the enc
messa ge "FKMFIO" of the plain text "attack ".(usin g Hill
ted
ci:Cr )
2

€) Let's consider the Cipher text


TEFETEOAAT". Using the Rail Fence
2
"~~MATRHTGPRy_E
Cipher , find out the plainte xt for key value 2.

Page 2 of 4
Draw the inter nal struc ture for the singl e roun d of 2
4. Ja) DES
algor ithm.
In DES encry ption , the 64-b it outp ut of roun d 16 2
(b) 1s
(6821 345A C821 _305A)111·,x 1• Find t he 64 -bit inpu t to inver
se
initia l perm utati on stage .

(c) Using the Fiest el ciphe r struc ture that uses only two roun 2
?s
gene rate the ciphe rtext (in Hexa decim al form) for the 16
bits
plain text "1AC 8" (in Hexa decim al form) . Assu me the
roun d
funct ion as logic OR opera tion and the subk eys for roun d
1, 2 ,
3 are "34", "56", ''13" (in Hexa decim al form) respe ctive ly.

s. .-(a) Calcu late (1234 1) Mod 5771 3 2

,(b) Exam ine with relev ant re~so n whet her the set Zs of integ ers 2
{O, 1, 2, 3, 4, 5, 6, 7} with 1the arith meti c oper ation s modu lo
8 is
a field or not. '

. (c) f(x) = (x6 + x 4 + x3+ x2 + 1)., g(x) = (x7 + x + 1) and m(x) = (x8
+ x4 2
+ x3 + x + 1) calcu late: (i) f(x) + g(x) (ii) f(x).g(x) mod
m(x) for
GF( 28)

6. (a) Expl ain the meet -in--t he midd le attac k of mult iple encry ption
s. 2
(b) Usin g Linea r Cong ruent ial Gene rator s, gene rate 5 rand om
bits 2
for modu lus m=12 7, multi plier a=7, incre ment c=2, seed xo=8
7.
(c) Gene rate 5 rand om bits tising Blum Blum Shub Gene rator
for 2
p=38 3, q=50 3, and seed xo=1 9264 9.

7. (a) Expl ain the four diffe rent stage s of AES trans form ation 2
funct ions with suita ble diagr am.

(b) In AES, calcu late the first colum n of outp ut state matr ix of
add 2
roun d key trans form ation for the given inpu t:
63 EB 9F AO 29 57 40 1A
co 2F 93 92 C3 1 14 22 02
AB 30 AF C7 50 20 99 07
20 CB 2B A2 SF FG 83 3A
(Inpu t to add round
(Rou nd key)
key transf ormat ion)

(c) Expl ain AES key expa nsion proc ess with suita ble diagr am
.
2
S. (a) In terms of secret key, how public key encryption is different 2
fro1n convenbonal encryption. What are the applications of
public key cryptosystem in information security?

(b) Name the SD{ ingredients of public key encryption. With 2


suitable diagram explain encryption with public key

(c) In a RSA cryptosystem , A uses two prime numbers p = 2 and 2


q =11 to generate her public and private keys. If the public
key of A is 7, what is the private key of A?

9• (a) lliustrate two ways in which a HASH function can be used for 2
message authenticatio n.
(b) EA-plain with diagram how MAC can be used for message 2
authenticatio n and confidentiality.
(c) List and explain the top web security threats. 2

10 (a) Explain the key factors contributing to the higher security risk 2
of wireless networks compared to wired networks.
(b) List and briefly describe the security treats to wireless 2
networks.
(c) Explain Wireless Security measures dealing with wireless 2
transmission s, wir~less access points, and wireless networks.

*End of Questions*

You might also like