You are on page 1of 2
QP Code: 217027 Reg. No | | | | SAVEETHA ENGINEERING COLLEGE (Autonomous, Affiliated to Anna University, Chennai) B.E./B. Tech, End Semester Examinations — Nov/Dec 2021 (R2017) Seventh Semester Common to CSE and IT CS8792— Cryptography and Network Security Time: Three hours Maximum marks: 100 Answer All Questions PART A (10 x 2 =20 marks) 1. Convert the plaintext “ROCK” to CIPHER text with a keyword “BOTS” using one time pad Demonstrate the difference between Cryptography and Steganography. List the entities that are kept secret in conventional encryption algorithms What are the design parameters of a Feistel cipher? wkwn Apply the Miller-Rabin algorithm to test a number for primality. Demonstrate the attacks on RSA Algorithm. What is weak collision resistance? What is the use of it? How digital signature differs from conventional methods? Compare Transport and Tunnel mode in IPsec. How can the signed data entity of S/MIME be prepared? Write the steps. PARTB (5x 13 = 65 marks) 11. (a) Demonstrate in detail about OSI Security Architecture, (3) (OR) (b) Solve: Perform encryption and decryption using Hill cipher for the following: message (13) ~ PIN and key — ACTIVATED. 12, (a) _ Explain the key generation in AES algorithm in detail. (13) (OR) (b) Summarize about working principles of DES encryption and decryption (3) 13. @) (b) (a) (b) @ (b) fa) () Solve 3/21 mod 1 using Fermat's theorem, Make use of Primality testing forn=61 (13) a2, (OR) Explain exponentiation and Logarithm in detail with suitable examples. (3) Explain X,509 authentication services with necessary diagrams. (3) (OR) With neat diagram explain SHA algorithm in detail with suitable examples. (13) Explain the different types of firewall and its configurations in detail (13) (OR) Demonstrate any two advanced anti-virus techniques in detail (13) PART C (1x 15= 15 marks) (Case study/Comprehensive type Questions) Solve: Why ECC is better than RSA? However, why itis not used widely? Defend it. (15) (OR) Make use of ElGamal and Schnorr Algorithm, generate and verify the cryptosystem in (15) detail with an example.

You might also like