CS8792 Cryptography and Network Security 1
CS8792 Cryptography and Network Security 1
CS8792 Cryptography and Network Security 1
com
Anna University | Polytechnic | Schools
Reg. No. :
Sixth/Seventh Semester
(Regulations 2017)
1. www.binils.com
What is meant by Denial of Service attack? Is it Active Attack or Passive
Attack?
www.binils.com
Anna University, Polytechnic & Schools
www.binils.com
Anna University | Polytechnic | Schools
PART B — (5 13 = 65 marks)
11. (a) (i) Let message = “graduate”, Key = “word”, find ciphertext using
playfair cipher. (8)
(ii) List out any two di-gram, two tri-gram. Shortly describe the
application of di-gram and tri-gram in cryptography. (5)
Or
12. (a) (i) Draw the functionality diagram (functionality in one round) of DES
with number of bits in each flow of data. (8)
(ii) Explain the bitwise XOR operation which involved in RC4. (5)
Or
(b) (i) Explain with sample data: Four transformations in AES. (10)
13. (a) (i) Demonstrate the DH key exchange methodology using following key
www.binils.com
values : p 11 , g 2 , X A 9 , X B 4 . (7)
(ii) Diffie–Hellman key agreement is not limited to negotiating a key
shared by only two participants. Any number of users can take part
in an agreement by performing iterations of the agreement protocol
and exchanging intermediate, Write the steps and formulas to be
followed for DH key exchange between Alice, Bob, and Carol. (6)
Or
(b) (i) In a public-key system using RSA, you intercept the ciphertext
C = 20 sent to a user whose public key is e = 13, n = 77. What is the
plaintext M? (7)
(ii) In an RSA system, the public key of a given user is e = 65, n = 2881,
What is the private key of this user? (6)
14. (a) Write the steps involved in the Generation of Message Digest. (13)
Or
2 40404
www.binils.com
Anna University, Polytechnic & Schools
www.binils.com
Anna University | Polytechnic | Schools
15. (a) Discuss the seven types of MIME content type.
Or
(b) Draw IPSec Authentication Header and write short notes on each
element of the Header.
PART C — (1 × 15 = 15 marks)
16. (a) A Box contains gold coins. If the coins are equally divided among three
friends, two coins are left over, If the coins are equally divided among five
friends, three coins are left over If the coins are equally divided among
seven friends, two coins are left over. If the box holds smallest number of
coins that meets these conditions, how many coins are there? (Hint : Use
Chinese Remainder Theorem).
Or
(b) (i) Alice chooses 173 and 149 as two prime numbers and 3 as public
key in RSA. Check whether the chosen prime numbers are valid or
not? (5)
(ii) Prove that Euler’s Totient value of any prime number (p) is p 1
and the Euler’s Totient value of the non-prime number (n) is
p 1 q 1 where p q are prime factor of n. (5)
(iii) Mr. Ram chooses RSA for encryption, and he chooses 3 and 7 are
www.binils.com
two prime numbers. He encrypt the given message (message given
in English alphabets) by mapping A = 1, B = 2, C = 3.., Z = 26. Find
atleast two problems in his implementation. (5)
—————————
3 40404
www.binils.com
Anna University, Polytechnic & Schools