You are on page 1of 2

Birla Institute of Technology & Science, Pilani

Work Integrated Learning Programmes Division


Second Semester 2021-2022
Comprehensive Examination
(EC-3 Regular)

Course No. : CSI ZG513


Course Title : Network Security
Type of Examination : Open Book
Weightage : 50% No. of Pages =2
Duration : 2 Hours No. of Questions = 7
Date of Exam : 20/05/2022 (FN)
Note:
1. Please follow all the Instructions to Candidates given on the cover page of the answer book
2. All parts of a question should be answered consecutively. Each answer should start from a fresh page
3. Assumptions made if any, should be stated clearly at the beginning of your answer
4. Generalize /confusing answers will fetch ZERO / NEGATIVE marks
5. Show all the numerical calculations in fair and box/highlight the final answer
6. Missing step(s)/explanation will earn zero/negative marks
7. Read the question carefully and then answer

Q.1. For hash functions, it is crucial to have a sufficiently large number of bits output, e.g., 160
bits. However, for MACs shorter lengths, say 80 bits are sufficed. Why? For your answer,
assume a message x is sent in the clear text together with its MAC/Hash over the channel.
[4 Marks]

Q.2. Derive the number of entries to be stored in memory and the number of bytes to be stored for
each entry for Meet in the middle attack of AES-192 double encryption. (Show all the steps)
[4 Marks]

Q.3. For a given hash function, h with an output length of n bits. Derive the average number of
comparisons and average memory requirements for the second preimage resistance attack
and collision attack on it? (Show all the steps) [4 Marks]

Q.4. Using Euclidean Algorithm, compute GCD and value of s, t for the following (Show all the
steps)
a. 198 and 243 [7 Marks]

Q.5. Consider the following substitution block cipher: (Show all the steps)

Plain-text Cipher-text
000 110
001 100
010 111
011 001
100 101
101 000
110 010
111 011

Compute the cipher-text belonging to plaintext 001 110 000 101 110 (using a block size of 3
bits) for the Electronic Code Book (ECB) mode and Cipher Block Chaining (CBC) mode
taking IV = 111. Show the intermediate steps. [7 Marks]
Q.6. Draw block diagram for below function: [12 Marks]

Gi = EKi(Gi−1) ⊕ Gi−1


Hi = EKi(p(Gi−1)) ⊕ p(Gi−1)

Q.7. Explain SHA-1 in detail. [12 Marks]

***********

You might also like