SEIT3062 - Ravirajsinh Chauhan
SEIT3062 - Ravirajsinh Chauhan
SEIT3062 - Ravirajsinh Chauhan
SECTION – I
Q-1 Answer the Following: (MCQ/Short Question/Fill in the Blanks) [05]
(i) To provide authentication through public key cryptosystem sender encrypt
with_______________ and receiver decrypt with__________________.
(ii) In Hill cipher, the ciphertext can be calculated by ____
a. C=PK mod 26
b. C=KP mod 26
c. C=(K mod 26)*P
d. C=(P mod 26)*K
e.
(iii) Change one bit of the input, at least 50% of the output should be different, this property is
called ______________.
(iv) ________________ is the assurance that someone cannot deny something
a. Access Control b. Integrity
b. Non-Repudiation d. Authentication
(v) Block size for AES-192 is_______________.
a. 128 bit
b. 192 bit
c. 256 bit
d. 292 bit
Q - 2 (a) List out type of attacks and explain any two active security attacks. [05]
Q - 2 (b) Discuss single round of Data Encryption Standard with neat sketches. [05]
OR
Q - 2 (a) Use Playfair cipher substitution technique and find out cipher text for the following given [05]
key and plaintext.
Key = GOVERMENT
Plaintext= PLAYFAIR
Q - 3 (b) Find the Inverse of integer value 31 when mod value is 3480 with Extended Euclid [05]
Algorithm.
OR
Q - 3 (a) Explain various general categories of schemes for the distribution of public keys. [05]
Q - 3 (b) In a public key cryptosystem using RSA, sender wants to send message m which is sent to [05]
the user whose public key is e=7 and two distinct primes p=11, q=17. Find the Ciphertext
only when message M=9.
Q-4 Attempt any one. [05]
(i) List out block cipher modes of operations and explain any one in detail.
(ii) Write the necessary condition to satisfy Groups, Rings and Fields.
Page 1 of 2
SECTION – II
Q-1 Answer the Following: (MCQ/Short Question/Fill in the Blanks) [05]
(i) Define pre-image resistant property of cryptography hash function.
(ii) What is the output size of SHA-1 algorithm?
(iii) Full form of IKE is _________________.
a. Internet Key Exchange
b. Information Key Exchange
c. Internet Key Encryption
d. Information Key Encryption
(iv) What is firewall?
(v) _________is a type of malicious software that infects a computer and restricts users' access to
it until a ransom is paid to unlock it.
Q - 2 (a) Explain Elgamal digital signature algorithm in detail. [05]
Q - 2 (b) Explain the use of Cipher Block Chaining for generation of hash function. [05]
OR
Q - 2 (a) Draw structure of MAC based on hash functions and explain its components. [05]
Q - 2 (b) Explain any two scenarios where authentication is required to ensure security of the [05]
system.
Q - 3 (a) Enlist the characteristics of Hash function. Explain any two properties with suitable [05]
example.
Q - 3 (b) Demonstrate the steps involved in Kerberos version 4. [05]
OR
Q - 3 (a) Write a note on AH and ESP. [05]
Q - 3 (b) Write a note on securities at various layers of TCP/IP. [05]
Q-4 Attempt any one. [05]
(i) Write short note on digital signature algorithm.
(ii) Describe hand shake protocol of SSL with suitable example.
*******
Page 2 of 2