,/-% \d\e
E G7907 W#713
RegNo.:
{flr-rffisV&t
APJ ABDTJL KALAM TECHNOLOGICAL UNIVERSITY
SEVENTH SEMESTER B.TECH DEGREE EXAMINATION. DECEMBER 2018
Course Code: CS409
Course Name: CRYPTOGRAPIIY AND IYETWORK SECIIRITY
Max. Marks: 100 Duratlon: 3 Hours
PART A
Answer all questions, each carries 4 marks. Marks
Differentiate between computationally secure cipher and unconditionally secure (4)
cipher. Write examples with reasoning.
Encrypt the message "this is an exercise" using the additive Cipher with ke520 (4)
What is the necessity of block cipher modes of operation? List out the (4)
advantages and disadvantages of outputfeedback mode.
4 Generate the key attributes for the values p : 11 and q: 3. Also encrypt the (4)
message m:2 with the generated keys.
5 Find gcd (1970,1066) (4)
6 Discuss digital signature scheme using RSA (4)
Write the general structure of Private Key Ring used in Pretty Good Privacy (4)
(PGP).
8 What are the functionalities provided by Secure MIME (SA4IME)? (4)
9 What is the significance of Alert Protocol in Transport Layer Security? (4)
l0 Why the attacker is not able to recognize the actual sender of the message in (4)
encrypted tunnels?
PART B
Answer any twofull questions, each carries 9 marks.
11 a) Use Playfair Cipher with key COMPUTER to encrypt the message (5)
..CRYPTOGRAPI{Y''.
b) How key generation is done in DES. (4)
12 a) Discuss the stream cipher RC4 in detail (4)
b) Illustrate the round transformation of IDEA. (s)
-1 3--a) * EnaffiTetext TovE-
b) Illustrate S box creation in AES (5)
Page 1of2
G7907 Pages:2
'''..,;
. Answer any twofaA quesfionsreach carries 9 marks.
14.'.a) Define Euler's Totient Function. prove that, Q(pq) - (p-lXq-l), where p and q (5)
are prime numbers.
b) Demonstate Diffie Hellman Key exchange algorithm. (4)
15 Illustrate the working of SHA-I with diagrams. (e)
16 a) what are the SecurityRequirements ofmessage authentication? (4)
b) Give the encryption/decryption procedures using Ellipic Curve Cryptography. (s)
PART I)
Answer any twofull questians, each carries 12 marks.
17 a) Explain tle sequence of steps involved in the message generation and reception (S)
in Pretty Good Privacy (PGp) with block diagrams.
b) List out the security association (sA) parameters in IpSec. (4)
l8 a) Illustrate the working of Secure Electronic Transact'on (sET) in detail. (s)
b) Compare Packet filter and Application Level Gateways. (4)
T9 a) Explain the method^ of protecting IP datagrarn from replay attack using Ipsec. (6)
b) Explain the sequence of steps used in Secure Socket Layer handsirake protocol (6)
for establishing a new session. Draw a diagram which shows the'action of
Handshake Protocol.
****
Page2of2