CST433 Security in Computing, December 2023
CST433 Security in Computing, December 2023
CST433 Security in Computing, December 2023
RegNo.:
a
APJ ABDUL KALAM TECIINOLOGICAL tJN
Seventh Semester B.Tech Degree Regular and Supplementary Examination
l' attacks?
What is the difference between passive and active security (3)
2 Distinguish between Security Mechanisms and Security Services? (3)
6 What are the main properties of Elliptic Curves that make them useful for (3)
Cryptographic Applications.
7 List the requirements of Hash functions. (3)
8 State the need for Digital Signatures. (3)
9 List and briefly define three classes of Intruders (3)
l0 In general terms, how does a virus propagate? (3)
PART B
Answer any onefull questionfrom each modale, each carries 14 morks.
Module I
I I a) Differentiate between substitution and transposition ciphers with examples for (7)
each. r
b) Use the Play-fair cipher to decipher tF'message "MANAGE". The secret key is (7)
the word "BRAZIL".( The characters 'J and K ' should occupy same slot ).
OR
12 a) Use Hill.cipher to encipher the message "secure world" with the following (7)
key: [! ?1. ,
ur" filler letter as 'a"l
b) Encrypt the message "this is an exercise" using each of the following ciphers (7)
given below. Ignore the space between words. Decrypt the message to get the
orilinal plaintext.
Page lof2
OR
t4 a) Briefly desuibe sub-key generation in AES Cipher? (10)
b) Compare Electronic Codebook (ECB) and Cipher Block Chaining (CBC) modes (4)
of block ciphers
. Module lll
l5 a) Users A and B use the Diffie-Hellman key exchange technique with a common (7)
prime q:71 and a primitive root o=7
a. If user A has private key ,Xl:5 what is A's public key ?
b. If user B has private key,Xn=I2 what is B's public key ?
c. What is the shared secret key?
b) Perform encryption using RSA algorithm for message M=8, given prime (7)
OR
16 a) Explain the El-Gamal cryptosystem with an example (7)
b) Illustrate the steps in key exchange using Elliptic Curve Cryptography (ECC)? (7)
Module lV
17 a) With diagrams, briefly describe the working of SHA-512 algorithm. (10)
OR
b) What are the properties a digital signatde should have? Explain the two (7)
b) What is Distributed denial of service (DDoS) attack? How can it be prevented? (7)
OR
20 a) What are the different password selection strategies? (7)
b) Briefly explain the four phases, a virus goes through in its lifetime. (7)
Page2of2