Sie sind auf Seite 1von 2

USN 1 S I ECEL26

Siddaganga Institute of Technology, Tumkur – 572 103


(An Autonomous Institution affiliated to Visvesvaraya Technological University, Belgaum, Approved by AICTE, New Delhi, Accredited by NBA, New Delhi,
An ISO9001:2008 Certified)

Eighth Semester B.E. Electronics & Commn. Engg. Examinations May - June 2014
Cryptography and Network Security
Time: 3 Hours Max. Marks: 100
Not : 1. Question No. 1 is Compulsory
e
2. Answer any 4 full questions from question No. 2 to Question No. 6

1 a) Masquerade can be classified as ______ attack.


b) A technique by which letters of plain text is replaced by other letters is called ______.
c) The DES encryption algorithm uses ______ key to encrypt ______ plain text.
d) One of the advantages of DES encrypture is ______.
e) 4 (mod 23) is equal to ______.
f) Encryption of one bit at a time is called ______ cipher.
g) Symmetric ciphers use ______ key for encryption.
h) Two important security issues addressed in public key encryption are ______ and ______.
i) A digital signature is achieved by ______ key of encryption.
j) A message authentication code is a function of both ______ and ______.
k) A hash function is generated by using ______.
ℓ) Diffie-Hellman key exchange protocol is insecure against ______ attack.
m) The digital signature standard uses the key ______ in addition to private and public key
components.
n) Two important web based security approaches at network level and transport level are ______
and ______.
o) Mention the advantages of 3-DES.
p) A dual signature links ______ messages intended to two different recipients.
q) Honey pots are designed to ______ from accuring computer system programmes.
r) Unix password scheme uses ______ and ______ for encryption.
s) One of the important malicious software ______ contain hidden code when invoked performs
harmful function.
t) A Malicious program that replicates itself and make capture of its own and sends from
computer to compute is called ______. 1  20
2 a) Define models for network security and access security with a neat diagram. Explain the
security aspects for both the models. 7
b) Distinguish between manoalphabetic and polyalphabetic substitution ciphers and highlight the
advantages and weakness of these ciphers. 7
c) Using playfairs cipher. Find the cipher text for the plain text. SIT COLLEGE OF
ENGINEERING WITH the key : ‘’TECHNOLOGY’’. 6
3 a) Describe with a diagram a single round of DES algorithm and key generation for a Text of 64
bits and key size of 56 bits. 7
b) Explain with a diagram AES encryption process and highlight the AES data structure. 7
c) Write notes on any one of the following.
i) Avalanche effect ii) Differential crypt analysis iii) Feistel network iv) AES key
expansion. 6
4 a) Prove the Eulers theorem and show that for every a and n that are relatively prime.
a(n) = 1(mod n), where (n) in Euler’s Totient function. 6
-1- Please Turn Over

-2- ECEL26
b) Explain the RSA algorithm with key generation and an example for encryption and 8
decryption for P=17, q=11 and generate the public key and private key.
c) Define Hash function and show that how authentication and confidentiality both can be
achieved using Hash function. 6

5 a) Explain with a neat figure the digital signature standard (DSS) algorithm. Show how the DSS
signing and verifying is achieved. 7
b) Explain the procedures for UNIX password generation scheme to achieve password
protection from intruders. 7
c) Write notes on any one of the following.
i) Authentication protocols ii) Different approaches for digital signatures
iii) Web security approaches iv) Alert protocol v) SET procedure. 6

6 a) What are the two categories of malicious program? Explain each category with an example. 6
b) Explain the functioning of digital immune system for virus counter measures. Define the role
of blocking software. 6
c) Describe the three firewall configuration with a neat diagram. 8
________

Das könnte Ihnen auch gefallen