Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

CHAROTAR UNIVERSITY OF SCIENCE & TECHNOLOGY

Sixth Semester of B. Tech (CE/IT) Examination


May 2021
CE348 Information Security
Instructions:
1. The question paper comprises two sections.
2. Section I and II must be attempted in separate answer sheets.
3. Make suitable assumptions and draw neat figures wherever required.

SECTION-I MCQ

Question A B C D
Signing process of TCP UPD HTTPS HTTP
digital signature is
carried out over
Signature in digita applying hashing on applying hashing on applying hashing on None of the
signature is message only message and signs message and using above
generated by the message by public key of sender
private key of
sender
_____________assur Encryption Decryption MAC None of the
es that data received above
are exactly as sent by
(i.e., contain no
modification,
insertion, deletion,
or
replay) and that the
purported identity of
the sender is valid.
Message TRUE FALSE
Authentication Code
(MAC) protects two
communicating
parties from third
part but it can not
protects against each
other.
Which techniqie is Permutations Substitutations Compression None of the
used in hash above
algorithm to produce
fixed length string
from variable length
input?
Given expression After produing hash Before produing After first produing All the above
E(K, [M || H(M)]), H(M) but before hash H(M) but after hash H(M) and then
encryption key K is appending with appending with appending H(M)
applied original message original message with original
(M) (M) message (M)
For any given block , Second Preimage Collision Resistant A,B Preimage
it is computationally Resistant resistant
infeasible to find y Z
x with H(y) = H(x).
It is computationally Second Preimage Collision Resistant A,B Preimage
infeasible to find any Resistant resistant
pair
(x, y) such that H(x) =
H(y).
What are the block 512 & 32 1024 & 32 1024 & 64 None of the
size and word size of above
SHA-512?
Elgamal Primitve root Prime factorization Descret Logrithm None of the
cryptosystem is above
based on
John recently
received an
electronic mail
message from Bill.
What cryptographic
goal would need to
be met to convince
John that Bill was
actually the sender
of the message? A. Nonrepudiation B. Confidentiality C. Availability D. Integrity
When correctly
implemented, what
is the only C. Advanced
cryptosystem known A. Transposition B. Substitution Encryption
to be unbreakable? cipher cipher Standard D. One-time pad
Matthew and
Richard wish to
communicate using
symmetric
cryptography but do
not have a
prearranged secret
key. What algorithm
might they use to
resolve this
situation? A. DES B. AES C. Diffie-Hellman D. Skipjack
Which of the
following is hardest
to break using
frequency analysis? a) Vigenere cipher b) Hill cipher c) Caesar cipher d) Affine cipher
"A key is a string of
bits used by a
cryptographic
algorithm to
transform plain text
into ciphertext."
Which of the
following is capable
of becoming a key in An array of
a cryptographic characters (i.e. a
algorithm? An integer values A square matrix string) All of the above
In the DES algorithm
the Round Input is
32 bits, which is
expanded to 48 bits a) Scaling of the b) Duplication of d) Addition of
via ____________ existing bits the existing bits c) Addition of zeros ones
For StreamCipher (K)
= S, S is the a. Key b. Keystream c. Public key d. Private Key
For the AES-128
algorithm there are
__________ similar
rounds and
_________ round is
different.
SSL primarily a) integrity and b) integrity and non- c) authenticity and d) confidentiality
focuses on _______ authenticity repudiation privacy and integrity
In SSL, what is used b) MAC (Message c) MAC (Machine
for authenticating a a) MAC (Message Authentication Authentication d) MAC (Machine
message? Access Code) Code) Code) Access Code)
Calculate two
primitive roots of 17. 3&5 3&6 4&5 3&9
What is to be
ensured from
following
mathematical
expressions: Z =
E(PUb, E(PRa, X))
and X = D(PUa, Integrity & Authentication & Confidentiality &
D(PRb, Z)) Confidentiality Confidentiality Privacy All the above
A. Prime factorization
1. Elgamal Cypto
B. Discrete
Logarithm 2. RSA
C. Calculte Secret 3. A=>2,B=>1,C=>4,D A=>2,B=>1,C=>4,D A=>1,B=>2,C=>3,D A=>2,B=>1,C=>3
Rabin Crpto =>3 =>5 =>4 ,D=>4
D. Chinise Reminder
theorem 4. Deffi-
Hallman
5. HMAC
Given p = 11; q = 13, 103 104 105 106
e = 11;M = 7 perform
encryption function
and get value of
cipher text using
RSA.
If message size in
SHA512 is 1650 then
what is the total
padding bits are
required for the 128
bit block? 280 279 270 269
What will be the
ciphered text
corresponding to
plain text
“ARMYMAN” if an
affine cipher is used
with key values as
a=5, b=10? KRSMSOX KRSASSX KRSASKY KRSASKX
What will be the plain
text corresponding to
cipher text
“VACATION” if
vigenere cipher is
used with keyword
as “READ”? EWCXCEOK EWCXDEOK EWCXCEPK EYCXCEOK
A. Secrecy 1. MAC
B. Integrity 2.
Irrevercible
C. Authentication 3.
To protect session-
key
D. Master Key 4.
Temporary key
5. Confidentiality A=>5,B=>2,C=>1,D A=>6,B=>2,C=>4,D A=>5,B=>1,C=>2,D A=>2,B=>5,C=>1
6. Non-repudiation =>3 =>3 =>3 ,D=>3
What will be the
ciphertext
corresponding to
plain text
“CHECKYOURHOU
SEKEY” using rail
fence cipher with key CKRSYHCYUHUE CKRSYHCZUHUE CKRSYHCYUHUE
value given to be 3? EEOOK EEPOK EFGOK
What will be the
ciphered text if the UOFQMDBKGHT
string UOFQMDBKGHSN UOFQMDBKGHTM UOFQMDBKHHTN N
“SURFACELIGHT” is
given as input to the
code of playfair
cipher with keyword
as “NIGHTMARE”
(assuming j is
combined with i)?

SECTION-II Descriptive

1 In case of an insecure communication medium, how does Bob and Alice will securely share the key
without sharing actual key.

Determine the proper algorithm and calculate the shared secret of Bob and Alice. Consider prime q=71
and a primitive root a=7.

If User Bob and Alice has private key 5 and 12 then calculate A's public key and B's public key.

2 Bob Calculates the public key elements by choosing prime number q=19 using Elgamal cryptosystem.

What are the values of other parameters such as α & Ya? After getting all public components,

Bob broadcasts public key to Alice. Alice performs the encryption by choosing message, M=10.

Calculate the cipher texts performed by Alice. The private component of Bob and Alice are 4 and 6
respectively.

3 Draw and Explain symmetric key distribution scenario

4 Draw digital signature process and explain essential element of it.

5 Generate the 2 key of SDES using Key generation algorithm and using that sub key encrypt the
following data. Let the plaintext be the string 01110010 Let the 10-bit key be 1010000010.

6. Explain detailed Structure of AES with its four Transformation.

8. Use a Hill Cipher to encipher the message “We live in an insecure world” use the following key:

K=|3 2|

|5 7|

9. Difference between 1) differencial and linear cryptanalysis 2) Monoalphabetic cipher and


polyalphabeticcipher..

You might also like