Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Reg. No.

L77Str. 1

, FOUR YEAR B.TECH. DEGREtr EXAMINATIO}{ _ JULY 2,02T,

SEVENTH SEIVIESTER EXA},TINATI ON


COMPLTTtrR, SCIENCE ANI] ENGINEERING
NETWORK StrCURIlY AND CRYPTOGRAPHY (NSC)
(scHEME - 2017)

Time : 3 Hottrs Max. Marks: 60

Note : (i) Answer Question No. 1 and any ONtr Question from each
Unit"

(iil Ali questions carry equal marks.

1. Answer the foltowing questions.

(a) State the difference between authenticity and accountability. (2)

(b) List the essential ingreclients of Symmetric encryption cipher. (.2>

(c) Why AES aigorithm is replacement of DES algorithm? (2)

(d) Define Prime Number. Wri.te its application. (2)

(e) What characteristics are needed in a Secure }Iash Function? (2)

UNIT I

2. (a) Write the key objectives of the Computer Security. (t-r)

(b) Li.st the categories of how Computer algorithms and Protocols are
grouped. (5)
_

Oq

rl
o. (a) Describe the Challenges of Computer Security. (5)

(b) Differentiate between Passive attacks and Active attacks. (5)

Turn Over
UNIT II

4. (a) Explain the Hill Cipher with an example. (5)

(b) Encrypt the message "Meet me in the mid-night" using play fair cipher.
(5)

Or

5. (a) Describe the simplest cipher of Transposition Technique with ?l]


example.
(b) Wrr.te short notes on Steganography. B
UNIT III
6. (a) Describe Mix Co1um's in AES. (5)

(b) List any two types of Blor:k cipher mod.es of operation and explain. (5)

Or

7. (a) Explain add round key in AES. (5)

(b) State the d.ifferences between Sub bytes and shift rows in AES. (5)

UNiT iV

8. (a) Explain the Euler's totient function. (5)

(b) Explain the RSA algorithm. (5)

Or

e. (a) How Uliller-Rabin algorithm is used for testing primality? (5)

(b) Differentiate between Conventional and Public Key Encryp tion.


(5)

UNIT V

10. (a) Describe the requirements f,or a Cryptographic Hash F unction. (5)

(h) Explain message digest generation using SHA-512. (5)

Or

11. (a) Write the r:equirements for message authentication. (5)

(t ) What changes in HMAC are required. in order to replace one underlying


hash function with another? (5)

2 L77 s 11

You might also like