ST. ALOYSIUS INSTITUTE OF MANAGEMENT AND INFORMATION TECHNOLOGY[AIMIT] ST ALOYSIUS COLLEGE(AUTONOMOUS) V SEM M.C.

A EXAMINATION DEC 2012 SUB CODE : P605.5 PAPER : CRYPTOGRAPHY AND NETWORK SECURITY TIME 3HRS MAX MARKS :100 Note Answer any FIVE questions. Each question carries 20 marks.

1 A Define security “services”, “attacks”, and “mechanism”, also 10M give classification of security services and attacks and describe them briefly B With a neat diagram explain symmetric cipher model 10M

2 A Explain playfair cipher. Discuss its encryption ,decryption 10M using the following data Plain Text: A lifetime of training for just ten seconds. KEY : Gates B Explain single columnar and double columnar transposition ciphers 10M
Discuss single columnar encryption and decryption using the following data Plain text: Treat your password like your toothbrush. Don't let
anybody else use it, and get a new one every six months. Key : Computer

3 A With a neat diagram discuss encryption using DES algorithm B State and prove Fermats theorem 4 A With a neat diagram explain encryption and authentication using public key cryptography B Explain the RSA algorithm and discuss the timing attacks on RSA
algorithm. Let p=7 , q=11, e=17 , M=8 perform encryption and decryption using the RSA algorithm 5 A Explain Miller-Rabin algorithm of testing of primality . Using the algorithm check whether 29 is prime or not

10M 10M 10M 05M

10M 10M

B Describe Diffie – Hellman Key Exchange. Let Users A and B use the Diffie-Hellman key exchange technique a common prime q=71 and a primitive root α =7 i) if user A has private key XA =5 , what is A’s public key YA?

what is B’s public key YB? iii) What is shared secret key? 6 A B 7 A B With a neat diagram explain blowfish algorithm Write a note on IP Security Architecture Discuss the different methods of distribution of public keys.ii) if user B has private key XB =12 . worms. 10M 10M 10M 10M 8 A Explain following terms with examples Virus. Briefly Discuss Electronic Mail Security. Trojan horse B What is a firewall? And With a neat diagram explain the main 10M types of firewall? .

Model question paper 2: ST.A EXAMINATION DEC 2012 SUB CODE : P605. decryption and cryptanalysis of the 10M following substitution ciphers 1.Monoalphabetic cipher 3 A With a neat diagram explain different Block Cipher modes of Operation B With a neat diagram explain simplified DES in detail 4 A What are the difference between conventional and public key encryption B What are the requirements of public key cryptography C Explain the RSA algorithm and discuss the attacks on RSA algorithm. e=11. ALOYSIUS INSTITUTE OF MANAGEMENT AND INFORMATION TECHNOLOGY[AIMIT] ST ALOYSIUS COLLEGE(AUTONOMOUS) V SEM M.5 PAPER : CRYPTOGRAPHY AND NETWORK SECURITY TIME 3HRS MAX MARKS :100 Note Answer any FIVE questions. Let p=11. Each question carries 20 marks.C. q=13.Caesar cipher 2. 1 A What are the essential ingredients of a symmetric cipher? 10M Explain with a neat diagram B Briefly explain the following terms 10M i)cryptography ii)plain text and cipher text iii)cryptology iv)cryptanalysis v)Decryption 2 B Briefly explain the hill cipher and discuss the encryption and 10M decryption of the plain text “COE” using the key “ANOTHERBZ” C Discuss encryption. M=8 perform encryption and decryption using the RSA algorithm 10M 10M 5M 5M 10M 10M 10M 5 A State and prove Eulers theorem B Explain digital signature algorithm? .

. What is a firewall? And With a neat diagram explain the main types of firewall? 10M 10M 10M 10M 10M 8 A Explain briefly about the trusted systems B Explain the different types of password management best practices? .6 A With a neat diagram explain the following cipher models i) Electronic code book mode ii) Output feedback mode iii) Cipher feed back mode iv) Counter mode Write a note on B 7 A B 10M i) stegnography ii) X.509 Authentication Service. Discuss the different methods of distribution of public keys.

Sign up to vote on this title
UsefulNot useful