Be Summer 2022
Be Summer 2022
Be Summer 2022
___________
MARKS
Q.1 (a) Define Cryptography and Cryptanalysis. 03
(b) Encrypt the following text with Caesar cipher: (Key=3) 04
“Welcome to the course Information and Network security”
(c) Differentiate public key cryptography and symmetric key 07
cryptography. Explain any one substitution method for
symmetric key cryptography with example.
Q.2 (a) What is the difference between passive and active security 03
threats? List and briefly define categories of passive and active
security attacks.
(b) Encrypt the message “security” using Hill Cipher with key 04
(9 4 5 7 )
(c) Explain four different stages of AES(Advance Encryption 07
standard) structure.
OR
(c) Justify how DES(Data Encryption standard) algorithm observes 07
Fiestel structure. Discuss use of S-box in DES algorithm.
Q.3 (a) Find out the greatest common divisor GCD of 96256 and 432. 03
(b) Let p=11 and q=7. Then find multiplicative inverse of 13 modulo 04
Φ(pq).
(c) Discuss need of block cipher mode of operations. Also explain 07
various block cipher mode of operations.
OR
Q.3 (a) What is message authentication? Explain the requirements of 03
message authentication.
(b) Justify the importance of Authentication in Security. 04
Demonstrate the working of Kerberos Version 4 Authentication
Dialogue with detailed steps.
(c) What is digital signature? Explain Elgamal digital signature 07
scheme in detail.
1
OR
Q.4 (a) Demonstrate the working SSL Record Protocol. 03
(b) Find out inverse of 12 with extended Euclidean algorithm in 04
Galois Field 79.
(c) Explain Diffie Hellman scheme with diagram. For Diffie- 07
Hellman algorithm, two publically known numbers are prime
number 11 and primitive root of it is 2. A selects the random
integer 9 and B selects 4. Compute the public key of A and B.
Also compute common secret key.
Q.5 (a) Illustrate the overall operation of HMAC. Define the terms. 03
(b) Explain the processing of a single block of SHA-1 algorithm in 04
detail.
(c) Explain Kerberos in detail. 07
OR
Q.5 (a) Explain X.509 authentication service. 03
(b) Explain Schnorr Digital Signature Scheme. 04
(c) Explain key distribution process using Key Distribution Center 07
(KDC).
*************