You are on page 1of 1

Coimbatore Institute of Engineering and Technology Department of Electronics and Communication Engineering INTERNAL TEST I (24.10.2013) FN Class: I M.

.E VLSI/ I SEM Subject: Security Solution in VLSI Part A (Answer all the Questions) 1. 2. 3. 4. 5. Time: 1Hr 30 min Max.Marks: 50 (5x 2 Marks) = 10 Marks

What is cryptography? Give the difference between block cipher and stream cipher. With transposition technique, convert the plain text ATTACKPOSTPONEDUNTILLFURTHERNOTICE to cipher text using the key 4312567. Distinguish between Symmetric key and asymmetric key. What is steganography? (1x8 Marks) + (2 x 16 Marks) = 40 Marks

Part B (Answer all the Questions) 1. 2. 3.

Explain in detail about the triple DES and cipher block chaining mode. Explain in detail about the working operation of DES algorithm. Convert the plain text 02468aceeca86420 into cipher text with the key 0f1571c947d9e859 using DES algorithm. Faculty incharge:M.Ramkumar raja

Coimbatore Institute of Engineering and Technology Department of Electronics and Communication Engineering INTERNAL TEST I (24.10.2013) FN Class: I M.E VLSI/ I SEM Subject: Security Solution in VLSI Part A (Answer all the Questions) 1. 2. 3. 4. 5. Time: 1Hr 30 min Max.Marks: 50 (5x 2 Marks) = 10 Marks

What is cryptography? Give the difference between block cipher and stream cipher. With transposition technique, convert the plain text ATTACKPOSTPONEDUNTILLFURTHERNOTICE to cipher text using the key 4312567. Distinguish between Symmetric key and asymmetric key. What is steganography? (1x8 Marks) + (2 x 16 Marks) = 40 Marks

Part B (Answer all the Questions) 1. 2. 3.

Explain in detail about the triple DES and cipher block chaining mode. Explain in detail about the working operation of DES algorithm. Convert the plain text 02468aceeca86420 into cipher text with the key 0f1571c947d9e859 using DES algorithm. Faculty incharge:M.Ramkumar raja

You might also like