Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Part B
11. (a) Encrypt the message “PAY” using Hill cipher with the following key matrix and show
the decryption to get the original plain text.
17 17 5
K= 21 18 21
2 2 19
(OR)
(b) Write short notes on:
(i) Fermat and Euler’s Theorem
(ii) Chinese Remainder Theorem
12. (a) Brief out the encryption and decryption process of DES and depict the general
structures. List out the strengths and weaknesses of the same.
(OR)
(b) Describe the mathematical foundations of RSA algorithm. Perform encryption and
decryption for the following:
p = 17, q = 7, e = 5, n = 119, message = “6”
Use Extended Euclid’s algorithm to find out the private key.
13. (a) Explain the process of deriving eighty 64-bit words from the 1024-bits for
processing of a single block and also discuss single round function in SHA-521 algorithm.
Show the values of W16, W17, W18, and W19.
(OR)
(b) Explain Diffie-Hellman Key exchange algorithm with an example. Consider a Diffie-
Hellman scheme with a common prime q = 353, and a primitive root α = 3. Users A and B
have private keys XA = 17, XB = 21 respectively. What is the shared secret key K1 and K2?
14. (a) Alice chooses Q = 101 and P = 7879. Assume (q, p, g and y): Alice’s Public Key. Alice
selects h = 3 and calculates g. Alice chooses x =75 as the private key and calculates y. Now,
Alice can send a message to Bob. Assume that H(M) = 22 and Alice choose secret no K = 50.
Verify the Signature.
(OR)
(b) For what purpose Zimmerman developed PGP? Brief the various services provided
by PGP. Discuss the threats faced by an e-mail and explain its security requirements to
provide a secure e-mail service.
15. (a) Explain NIST and VISA International Security Models and list the evaluation criteria
set by it.
(OR)
(b) Discuss the architecture of distributed intrusion detection system with the
necessary diagrams. Illustrate the three common types of firewalls with diagram.
Part B
11. (a) Explain any two classical ciphers and also describe their security limitations.
(OR)
(b) Describe Linear Feedback Shift Registers Sequences and Finite Fields with their
applications in cryptography.
12. (a) Describe the working principle of Simple DES with an example.
(OR)
(b) (i) Explain RSA algorithm.
(ii) Demonstrate encryption and decryption for the RSA algorithm parameters: p =
3, q = 11, e = 7, d = ?, M = 5.
13. (a) Explain Digital Signature Standard.
(OR)
Part B
11. (a) (i) What are the different types of attacks? Explain. (8)
(ii) State and explain Chinese remainder Theorem with example. (8)
(OR)
(b) (i) State Fermat’s Theorem. (4)
(ii) Find 321 mod 11 using Fermat’s theorem. (6)
(iii) State Euler’s theorem to find gcd with example. (6)
12. (a) Write down the Triple DES algorithm and explain with neat diagram.
(OR)
(b) Explain about the RSA algorithm with example as:
p = 11, q = 5, e = 3 and PT = 9.
Part B
11. (a) Write about any two classical crypto systems (substitution and transposition) with
suitable example.
(OR)
(b) Write about Fermat’s and Euler’s Theorem in detail.
12. (a) Explain briefly about DES in detail.
(OR)
(b) Explain about RSA with one suitable example.
13. (a) Explain about secure hash algorithm (SHA) in detail.
(OR)
(b) Explain about Diffie-Hellman Key exchange algorithm with one suitable example.
14. (a) Discuss about X.509 authentication service in detail.
(OR)
(b) Explain about S/MIME in detail.
15. (a) Write about virus and related threats in detail.
(OR)
(b) Explain briefly about trusted system.
Part A
1. What is the difference between a mono alphabetic and a poly alphabetic cipher?
2. What is an avalanche effect?
3. What are the disadvantages of double DES?
4. Define primitive root.
5. What is one-way property?
6. What are the two approaches of digital signatures?
7. What are the different types of MIME?
8. What protocols comprise SSL?
9. What is an Intruder?
10. Give few examples for worms.
Part B
11. (a) Explain briefly about Fermat’s and Euler’s theorems.
(OR)
(b) Explain the following with suitable examples.
12. (a) Discuss about DES in detail.
(OR)
Part-B (5 × 16 = 80)
11. (a) Explain about Chinese Remainder Theorem. (16)
(OR)
PART B – ( 5 * 16 = 80 marks )
11. (a) Explain about substitution and transposition techniques with two examples for
each.
(OR)
(b) What is the need for triple DES? Write the disadvantages of double DES and explain
triple DES.
12. (a) Explain how the elliptic curves are useful for cryptography?
(OR)
(b) In a public key system using RSA, you intercept the cipher text C=10 sent to a user
whose public key is e=5, n=35. What is the plain text? Explain the above problem with an
algorithm description.
13. (a) Write about the basic uses of MAC and list out the applications.
(OR)
(b) With a neat sketch, explain signing and verifying functions of DSA.
14. (a) Describe briefly about X.509 authentication procedures. And also list out the
drawbacks of X.509 version 2.
(OR)
(b) Write about SSL and TLS.
15. (a) Explain about intrusion detection techniques in detail.
(OR)
(b) Write about trusted systems in detail.
PART B — (5 × 16 = 80 marks)
11. (a) Using play fair cipher algorithm encrypt the message using the key "MONARCHY"
and explain.
(OR)
(b) Explain the ceaser cipher and mono alphabetic cipher.
12. (a) Explain the Key Generation, Encryption and Decryption of SDES algorithm in detail.
(OR)
(b) Write the algorithm of RSA and explain with an example.
13. (a) Illustrate about the SHA algorithm and explain.
(OR)
(b) Write a detailed note on Digital signatures.
14. (a) Describe the SSL Architecture in detail.
(OR)
(b) List out the participants of SET system, and explain in detail.
15. (a) Explain the types of Intrusion Detection Systems.
(OR)
(b) Explain the different types of firewall and its configurations in detail.
PART-B (5 × 16 = 80)
11. (a) Discuss the classical cryptosystems and its types. (16)
(OR)
(b) Describe Euler’s and Chinese Remainder Theorem. (16)
12. (a) (i) Explain about the single round of DES algorithm. (10)
(ii) Describe key discarding process of DES. (6)
(OR)
(b) Explain RSA method in detail. (16)
13. (a) Discuss the discrete logarithm and explain Diffie-Hellman key exchange algorithm
with its merits and demerits. (16)
(OR)
(16)
PART-B (5 × 16 = 80)
11.(a).Explain the OSI security architecture along with the services available.
(OR)
(b).(i).Given 10 bit key K=1010000010. Determine K1,K2 where
P10=3 5 2 7 4 10 1 9 8 6
P8= 6 3 7 4 8 5 10 9
by using SDES key generation method.
12.(a).(i).Perform Encryption/Decryption using RSA algorithm for the following:
p=3, q=11, e=7, m=5
(ii).What attacks are possible on RSA algorithm?
(OR)
(b).(i).Given the key 'MONARCHY' apply play fair to plain text "FACTIONALISM" to
ensure confidentiality at the destination, decrypt the ciphertext and establish authenticity.
(ii).Apply public key encryption to establish confidentiality in the message from A to
B. You are given m=67, KU={7,187}, KR={23,187}
13.(a).(i).Apply the MAC on the cryptographic checksum method to authenticate build
confidentiality of the message where the authentication is tied to message.
M=8376, K1=4892, K2=53624071
(ii).What are the properties a hash function must satisfy?
(OR)
(b).Explain MD5 message digest algorithm, with it's logic and compression function.
14.(a).Explain X.509 authentication service and it's certificates.
(OR)
(b).(i).Explain the services of PGP.
(ii).Write down the functions provided by S/MIME.
15.(a).(i).List the approaches for the intrusion detection.
(ii).Explain firewall design principles, characteristics and types of firewalls.
(OR)
(b).(i).Give the basic techniques which are in use for the password selection strategies.
(ii).Write down the four generations of antivirus software.
exchange protocol.
9. How are the passwords stored in password file in UNIX operating system?
10. What is meant by polymorphic viruses?
PART-B (5 × 16 = 80)
11. (a) (i). Discuss any four substitution cipher encryption methods and list their merits
and demerits.
(ii). How are diffusion and confusion achieved in DES.
(OR)
(b) (i). in AES, explain how the encryption key is expanded to produce keys for the 10
rounds.
(ii). Explain the types of attacks on double DES and triple DES.
12. (a) (i). How are arithmetic operations on integers carried out from their residues
modulo a set of pair wise relatively prime moduli. Give the procedure to reconstruct the
integers form the residue.
(ii). How is discrete logarithm evaluated for a number . what is the role of discrete
logarithms in the diffie hellman key exchange in exchanging the secret key among two
users.
(OR)
(b) (i). Identify the possible threats for RSA algorithm and list their counter measures.
(ii). State the requirements for the design of an elliptic curve crypto system. Using
that , explain how secret keys are exchanged and messages are encrypted.
13. (a). (i). Describe digital signature algorithm and show how signing and verification is
done using DSS.
(ii). Consider any message M of length 4120 bits ending with ABCDEF in
hexadecimal form. Construct the last block of message to be given as input for the MD5.
(OR)
(b) (i). Explain the processing of a message block of 512 bits using SHA1.
(ii). Write about the symmetric encryption approach for digital signatures.
14. (a) (i). Describe the authentication dialogue used by Kerberos for obtaining services
PART-B (5 × 16 = 80)
11. (a) Discuss in detail encryption and decryption process of AES.
(OR)
(b) (i). Briefly explain design principles of block cipher.
(ii). Discuss in detail block cipher modes of operation.
12. (a) (i). Discuss in detail RSA algorithm, highlighting its computational aspect and
security.
(ii). Perform decryption and encryption using RSA algorithm with p=3 q=11 e=7 and
N=5.
(OR)
(b) Briefly explain Diffie Hellman key exchange with an example.
13. (a). (i). Explain authentication functions in detail.
(ii). What is meant by message digest give example.
(OR)
(b) (i). Briefly explain digital signature algorithm.
(ii). Discuss clearly secure hash algorithm.
14. (a) (i). What is Kerberos? Explain how it provides authenticated service.
(ii). Explain the architecture of IPSEC.
(OR)
(b). (i). Explain handshake protocol actions of SSL.
(ii). Discuss in detail secure electronic transaction.
15). (a) (i). Explain firewalls and how they prevent intrusions.
(ii). Explain the concept of reference monitor.
(OR)
(b). (i). Define intrusion detection and the different types of detection mechanisms, in
detail.
(ii). Comment on password selection strategies and their significance.