SEIT3062 - Ravirajsinh Chauhan

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

P P SAVANI UNIVERSITY

Sixth Semester of B. Tech. Examination


May 2022
SEIT3062 Cryptography & Network Security
24.05.2022, Tuesday Time: 09:00 a.m. To 11:30 a.m. Maximum Marks: 60
Instructions:
1. The question paper comprises of two sections.
2. Section I and II must be attempted in same answer sheet.
3. Make suitable assumptions and draw neat figures wherever required.
4. Use of scientific calculator is allowed.

SECTION – I
Q-1 Answer the Following: (MCQ/Short Question/Fill in the Blanks) [05]
(i) To provide authentication through public key cryptosystem sender encrypt
with_______________ and receiver decrypt with__________________.
(ii) In Hill cipher, the ciphertext can be calculated by ____
a. C=PK mod 26
b. C=KP mod 26
c. C=(K mod 26)*P
d. C=(P mod 26)*K
e.
(iii) Change one bit of the input, at least 50% of the output should be different, this property is
called ______________.
(iv) ________________ is the assurance that someone cannot deny something
a. Access Control b. Integrity
b. Non-Repudiation d. Authentication
(v) Block size for AES-192 is_______________.
a. 128 bit
b. 192 bit
c. 256 bit
d. 292 bit
Q - 2 (a) List out type of attacks and explain any two active security attacks. [05]
Q - 2 (b) Discuss single round of Data Encryption Standard with neat sketches. [05]
OR
Q - 2 (a) Use Playfair cipher substitution technique and find out cipher text for the following given [05]
key and plaintext.
Key = GOVERMENT
Plaintext= PLAYFAIR

Q - 2 (b) B) Explain AES key generation process in detail. [05]


Q - 3 (a) Discuss X.509 Certificate in detail. [05]

Q - 3 (b) Find the Inverse of integer value 31 when mod value is 3480 with Extended Euclid [05]
Algorithm.
OR
Q - 3 (a) Explain various general categories of schemes for the distribution of public keys. [05]
Q - 3 (b) In a public key cryptosystem using RSA, sender wants to send message m which is sent to [05]
the user whose public key is e=7 and two distinct primes p=11, q=17. Find the Ciphertext
only when message M=9.
Q-4 Attempt any one. [05]
(i) List out block cipher modes of operations and explain any one in detail.
(ii) Write the necessary condition to satisfy Groups, Rings and Fields.

Page 1 of 2
SECTION – II
Q-1 Answer the Following: (MCQ/Short Question/Fill in the Blanks) [05]
(i) Define pre-image resistant property of cryptography hash function.
(ii) What is the output size of SHA-1 algorithm?
(iii) Full form of IKE is _________________.
a. Internet Key Exchange
b. Information Key Exchange
c. Internet Key Encryption
d. Information Key Encryption
(iv) What is firewall?
(v) _________is a type of malicious software that infects a computer and restricts users' access to
it until a ransom is paid to unlock it.
Q - 2 (a) Explain Elgamal digital signature algorithm in detail. [05]
Q - 2 (b) Explain the use of Cipher Block Chaining for generation of hash function. [05]
OR
Q - 2 (a) Draw structure of MAC based on hash functions and explain its components. [05]
Q - 2 (b) Explain any two scenarios where authentication is required to ensure security of the [05]
system.
Q - 3 (a) Enlist the characteristics of Hash function. Explain any two properties with suitable [05]
example.
Q - 3 (b) Demonstrate the steps involved in Kerberos version 4. [05]
OR
Q - 3 (a) Write a note on AH and ESP. [05]
Q - 3 (b) Write a note on securities at various layers of TCP/IP. [05]
Q-4 Attempt any one. [05]
(i) Write short note on digital signature algorithm.
(ii) Describe hand shake protocol of SSL with suitable example.
*******

Page 2 of 2

You might also like