0% found this document useful (0 votes)
62 views1 page

Seventh Semester Information Technology

This document is an internal assessment test for a cryptography and network security course. It contains 8 multiple choice questions testing key concepts in cryptography like cryptanalysis, block vs stream ciphers, Euler's theorem, and key management. It also contains 2 long form questions, one asking to identify RSA threats and perform encryption/decryption, and the other asking to explain the AES algorithm with a diagram. Finally, it contains an optional long form question about the properties of mathematical structures like groups, rings and fields or performing a Playfair cipher encryption.

Uploaded by

jaba123jaba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views1 page

Seventh Semester Information Technology

This document is an internal assessment test for a cryptography and network security course. It contains 8 multiple choice questions testing key concepts in cryptography like cryptanalysis, block vs stream ciphers, Euler's theorem, and key management. It also contains 2 long form questions, one asking to identify RSA threats and perform encryption/decryption, and the other asking to explain the AES algorithm with a diagram. Finally, it contains an optional long form question about the properties of mathematical structures like groups, rings and fields or performing a Playfair cipher encryption.

Uploaded by

jaba123jaba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Reg No:

S.M.K FOMRA INSTITUTE OF TECHNOLOGY, CHENNAI


Internal Assessment Test – I
Seventh Semester
Information Technology
CS6701 CRYTOGRAPHY AND NETWORK SECURITY
Time: 2 hours Maximum :50 marks
Answer ALL questions
PART A – (8*2=16 marks)

1. Define cryptanalysis and cryptography.


2. Compare steam cipher with block cipher with example.
3. Define Euler’s theorem and its applications.
4. What is block cipher principles?
5. What are the principle elements of a public key cryptosystem?
6. Define Triple DES.
7. State Chinese Remainder theorem.
8. Define key management.
PART B (2*13 = 26 marks)

6.(a). Identify the possible threats for RSA algorithm and perform decryption and encryption
using RSA algorithm with p=3, q=11, e=7 and N=5. (13)
(OR)
(b). State Chinese remainder theorem and find X for given set of congruent equations
using CRT. X=2(mod3) X=(3mod5) X=(2mod7). (13)

7.(a). Explain AES algorithm with neat diagram and explain the steps. (13)
(OR)
(b) Draw the general structure of DES and explain the encryption decryption process. (13)

PART C (1*8 = 8 marks)

8. (a) Discuss the properties that have to be satisfied by Groups, Rings and fields. (8)
(OR)
(b) Encrypt the following using play fair cipher using the keyword MONARCHY. “SWARAJ
IS MY BIRTH RIGHT”. Use X for blank spaces. (8)

You might also like