Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Reg. No.

:
Name :

Mid-Term Examinations – August 2021


Programme : B.Tech. Computer Science and Engineering Semester : Interim 2021-22
Course : Data Privacy Code : CSD3005
Faculty : Dr. Subhash Chandra Patel Slot/ Class No. : D11+DA1+DB1+DC1/014
Time : 1 ½ hours Max. Marks : 50

Answer all the Questions

Sub.
Q.No. Question Description Marks
Sec.

1 (a) Differentiate symmetric and asymmetric encryption, with suitable examples


(b) Compare Substitution and Transposition techniques with suitable examples.
5+5

2 (a) Explain Playfair cipher & Vernam cipher in detail.


5
(b) What happens when the Boolean function is replaced by bit-wise XOR? Rework the
above sub-parts for this change, and explain which Boolean function you would 5
prefer for the given application.
3 Reconstruct an LFSR of the shortest length which generates the sequence {1, 0, 0, 0, 1,
10
1, 1, 1} by using Berlekamp-Massey Algorithm.
4 Compare stream cipher with block cipher with example.
10

5 Describe the three main concerns with the use of passwords for authentication. Explain
10
what is meant by a social engineering attack on a password.


Page 1 of 1

You might also like