Professional Documents
Culture Documents
25 11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
1) The
1) The Question
Question Paper
Paper will
will have
have MCQs
MCQs (for
(for 20
20 marks)
marks) and
and Subjective/Descriptive
Subjective/Descriptive Questions
Questions
(for 60
(for 60 marks).
marks).
2)
2) MCQ
MCQ correct
correct options
options and
and subjective
subjective question
question answers
answers to
to be
be written
written on
on A4
A4 size
size papers.
papers.
Scan
Scan all
all pages
pages of
of answer
answer papers
papers of
of Q.1
Q.1 to
to Q.4
Q.4 and
and create
create single
single file
file in
in pdf
pdf format
format to
to upload
upload in
in
the
the link
link given.
given.
** Required
Required
1.
1. Email
Email **
2.
2. Enter
Enter your
your Name
Name **
3.
3. Enter
Enter your
your Seat
Seat Number
Number **
1)
1) The
The Question
Question Paper
Paper will
will have
have MCQs
MCQs (for
(for 20
20 marks)
marks) and
and
Subjective/Descriptive
Subjective/Descriptive Questions
Questions (for
(for 60
60 marks).
marks).
2511_IT_Sem-
2511_IT_Sem- 2)
2) MCQ
MCQ correct
correct options
options andand subjective
subjective question
question answers
answers toto be
be written
written on
on A4
A4
V_R19_CNS_FAMT
V R19 CNS FAMT size
size papers.
papers. Scan
Scan all
all pages
pages ofof answer
answer papers
papers of
of Q.1
Q.1 to
to Q.4
Q.4 and
and create
create single
single
~ ~ file in
file in pdf
pdf format
format to
to upload
upload in
in the
the link
link given.
given.
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 1/5
1/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
Q.1)
Q.1) 11to
to 55
Choose the correct option for following questions. All the Questions are
and carry marks 10=20M-
Which of the attack threatens the f?
Denial of service
Traffic 7$18
Authentication Header
Authentication Code
Modification Detection Code
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 2/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
Q.1)
Q.1) 6
6 to
to 10
10
q. Ritesh received an email from his bank asking for his confidential information to
update his account by clicking on a given link. This is an example attack.
Option A: | Virus
Option B: | Trojan Horse
Option C: | Phishing
Option D: | Social Engineering
8. If Ravi wants to authenticate himself for the message that he wants to send to Dilip
using RSA cryptosystem, which key Ravi should use?
Option A: | Public key of Dilip
Option B: | Private key of Dilip
Option C: | Public key of Ravi
Option D: | Private key of Ravi
9. If the plaintext “The house is sold” is encrypted using Vigenere cipher with key
“dollars”, the ciphertext will be
Option A: | Vuo mkig ve cnbu
Option B: | Wyp
solkh
wd docy
Option C:_ | Wxp mkis ve docy
Option D: | Vue solkh ye cabu.
Q.2
Q.2
Q2
A Solve any Two 5 marks each
i Use the playfais cipher to encipher the message “The key is hidden
under the door pad”. Use the word “GUIDANCE” as the key for
encryption.
ii. What is Hashed Message Authentication Code? How is it generated?
iit. Explain in brief the components and functions of Simple Network
Management Protocol.
B Solve any One 10 marks each
i. Explain various goals of security with example. Which security
mechanisms are used to fulfill these goals?
ii. What is Malware? Explain any two malware attacks with their
preventive measures.
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 3/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
Q.3
Q.3&& Q.4
@.4
Q3
A Solve any Two 5 marks each
L “Digital signature provides authentication, integrity and non-
repudiation” True or false? Justify your answer
it. What is Network Access Control? With diagram, explain elements of
Network Access Control System?
iit. Explatn the working of IPSEC 1 its different modes.
B Solve any One 10 marks each
1L What 1s Intrusion Detection System? How signature-based IDS and
Anomaly based work? State their advantages and Immutations
it. A.and B wish to use RSA to communicate securely A chooses public
key as (7,119) and B chooses public key as (13,221)
a) Calculate pnvate key of A.
b) Calculate pnvate key of B
c) With what key B will encrypt the message M=6 1f B wants to send it
to A. Find the ciphertext for the same.
Q4
A Solve any Two 5 marks each
1. How confidentiality and integrity are achieved using record protocol of
SSL?
it. Describe the NAC enforcement methods.
iit. What is Transposition Cipher? Explain any one technique with an
example.
B Solve any One 10 marks each
1 Explain with diagram, how Kerberos can be used to perform user
authentication?
it. Describe with appropriate diagrams how cryptographic secrets are
generated in TLS?
4.
4. Upload
Upload your
your answer
answer papers
papers **
Files
Files submitted:
submitted:
5.
5. Have
Have you
you uploaded
uploaded required
required pdf
pdf file
file of
of answers?
answers? **
Mark only
Mark only one
one oval.
oval.
(_) Yes
Yes
This
This content
content is
is neither
neither created
created nor
nor endorsed
endorsed by
by Google.
Google.
Google Forms
Forms
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 4/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 5/5
FB A8 093 2F8 3D 989 5B A53 BE 353 DA
A 09 2F 3D 98 5B A5 B 35 D 88
A8 8093 32F 83D 989 95B A5 3BE E353 3DAA88 A89
0 8 9 A 3 3 A
80 932 2F83 3D9 895 5BA 53B BE3 53DDA8 88A 89F FBA
93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
09 2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93
3 9 3 9 32404
93 2F8 83D 989 5BAA53 3BE 353 DA 88AA89 FBAA80 0932 2F83
2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93 F8 D
N.
Monday,
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98
Q.
Q.
Q.
Q.
Q.
Q.
Q.
F D 89 B 53 E 53 A 8 89 B 80 3 8 9 9
B:
2.
3.
1.
59728
N. B:
3.
2.
1.
F8 83D9 989 5BAA53 BE 353 DA 88AA89 FBAA80 932 2F83 3D9 895 5BA
3 5 B 3 D 8 F 9 F 8 5
59728
Q.2a)
c)
d)
Monday, May
b)
b)
b)
c)
d)
a)
a)
a)
a)
2 a)
Q.6.a)
b)
83 D98 895 BA 53B E35 53D A8 8A8 89F BA8 809 32F 83DD98 95B BA5 3BE
b)
b)
b)b)
b)
Q.55 a)
Q.44 a)
Q.33 a)
Q.11 a)
b)
Q.66 b)
D9 95 BA 53 E3 3D A8 8A 9F BA 09 32 83 9 95 A 3B 3
May 27,
Draw
Solve
A
A
in
98 95B BA5 53BE E35 3DAA88 8A8 9FB BA8 8093 32F8 83D 989 95B A53 3BE 353 3DA 88A
the
the
32404 -- Cryptography
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
and
27, 2019
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
Two
b) How
must
Question
Cryptography &
What
What
What
and d
in the
Show
6 a) Write
Solve any
Given
Triple
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
neat
Define
Define
A user
protocol
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
provide
What is
Explain
must be
Encrypt
What is
the help
Question No.
What is
the need
mounted
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
A secure
aa session
Compare
Two uses
algorithm
How does
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
advantages.
Paper
help of
distributed
2019 02:30
need of
Show how
well
mounted at
DES?
is the
Explain the
d using
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
advantages.
is the
Write short
be met
Define ARP
Triple DES?
Define DOS
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98
key
No. 1| is
& Network
Compare and
algorithm iii)
Encrypt “This
02:30 pm
provide server
any THREE
uses wish
protocol which
user wishes
of AH
Given modulus
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
“This is
met and
does IPSec
the handshake
the steps
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
wish to
using RSA.
KDC.
secure e-voting
distributed systems
wishes to
after
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE
short notes
of aa KDC.
labeled
server side
at various
systems
which can
AH and
is the
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
THREE from
DOS attack.
pm-05:30
Paper // Subject
Security
is aa firewall?
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
how Kerberos
IPSec help
Network Security
can be
ARP spoofing
and contrast
to do
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
the drawback
and enlist
modulus n=221
side and
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
pm
ESP.
help to
the significance
iii) El-Gamal
handshake process.
- 05:30 pm
the final
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
and ESP.
drawback of
layers.
process.
e-voting system
Compulsory.
involved.
mutual
RSA. Encrypt
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
various layers.
attack. Show
spoofing with
significance of
n=221 and
is Compulsory.
to establish
steps involved.
notes on(any
contrast DES
Subject Code:
be used
diagram
system is
do online
from Question
and client
with an
firewall? Explain
used to
Show the
is to
M=5.
Kerberos protocol
DES and
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
final exam”
Encrypt M=5.
to achieve
Question No.
59728
and public
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
of Double
to be
to set
59728
on(any two):
Algorithm
client side
Code: 32404
El-Gamal Algorithm
protocol can
enlist mechanisms
of aa digital
establish aa secure
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
1T01225
AES.
exam” with
two): i)
set up
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
and AES.
wherever
No. 22 to
Time
public key,
can be
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
Double DES
mechanisms for
an example.
Explain different
the different
6.
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
authentication.
=1T01225 -- T.E.
for the
online transactions
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
be designed.
key, e=7,
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
i) Email
be used
with Playfair
digital signature
different ways
up aa secure
different types
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
achieve authentication
used to
Draw neat well labeled diagram wherever necessary.
Hours)
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
Show
same.
transactions with
ways by
signature on
OK 2g 2s 24s 2s 2s 2k ois 2k 2K 2c 2 2 2k ok 2k
necessary.
e=7, find
(3 Hours)
the same.
****************
example. Compare
side authentication.
types of
DES algorithm?
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
authentication and
32404 // Cryptography
Playfair cipher
secure communication
designed. Discuss
find the
how
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
Email security
Compare with
Cryptography &
authentication. Show
by which
to achieve
algorithm? How
this
security ii)
T.E. (INFORMATION
88A89FBA80932F83D9895BAS53BE353DA
88A89FBA80932F83D9895BA53BE353DA
cipher using
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
the values
of firewalls
Show the
communication channel
which this
is it
can
on a a certificate?
using key
secure communication
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
values of
achieve single
with Amazon.com.
of p,
be
& Network
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
the security
firewalls and
channel and
ii) Diffie
the steps
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
spoofing.
IP spoofing.
this attack
p, q,
and confidentiality?
Justify
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
and list
certificate? Justify
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
done
security goals
communication channel
[Total
attack can
single sign-on
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
Amazon.com. Discuss
Security
(INFORMATION TECHNOLOGY)
exchange
“Guidance’’.
Network Security
Hellman
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
phi(n),
involved
with
and
Justify
can be
by
that
their
in
Discuss aa
q, phi(n),
be
and exchange
channel and
key “Guidance”.
session key after mutual authentication. Show how this can be done with
overcome by
goals that
confidentiality? Justify
steps involved
list their
Diffie Hellman
sign-on in
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83
[Total Marks
TECHNOLOGY) (Sem
Marks 80]
(10)
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 9
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)
(5)
(10)
(10)
(5)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5
V) (Choice
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53
(Choice Based)
3D 8 A8 9F A 09 2F 3D 98 5B A5
Based)/ /
Q.
Q.
Q.
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88
Q.4
Q.3
Q.2
Q.1
N.B.
79115
CA 58 890 D1 D90 136 62E 63 A21 B1 6FC 4C F1C A5 88 90D
8 D D 1 A 6 F 9 1
Network
79115
No.
Q. No.
Q.3 (a)
Q.2 (a)
Q.4 (a)
Q.1 (a)
(c)
A5 5889 90D 1D 901 366 62E6 63A 21B B16 FC4 4CF 1CAA58 8890 0D1 D90
(b)
(b)
(b)
(d)
(b)
9 3 F
Q. 55 (a)
(b)
88 0D 1D 01 66 2E 3A 21 16 C CF 1C 58 89 D1 D9 13
i)
25-Nov-2019
v)
N.B. :: (1)
ii)
58 90 1 90 36 2 63 2 B1 FC 4C 1C A5 8 0D D 01 66
8 D E 1 9 9
25-Nov-2019
vi)
iv)
(2)
iii)
Q. 66 Write
and
(d) List
88 90DD1D 901 1366 62E 63AA21 B16 6FC 4CF F1C A58 889 0D1 1D9 013 3662 2E6
Instructions
Security
90 1D 90 36 2E 63 21 B1 FC 4C 1C A5 89 0D D 01 66 E6 3A
What
(a) Write
(c) Write
(b) Write
Network Security
89 D1 9 13 62 6 A2 B 6F 4 F1 A 88 0 1D 90 36 2E 3 21
11) ARP
iii) Port
(a) Explain
(a) Explain
Instructions to
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
Is
(a) Perform
diagram.
(a) Explain
Write short
Explain
M=8.
(b) Describe
(b) Compare
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
1) HMAC
diagram.
and M=8.
vi) Session
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
Write short
(2) Attempt
Write short
(1) Question
to the
Honeypot
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
HMAC vs
v) EI-Gamal
Describe the
iv) Honeypot
Write aa short
PKI.
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
List S/MIME
Compare and
1T01225
short notes
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
Paper
Question No.
Explain Diffie
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58 Attempt any
short note
Spoofing
Scanning
short note
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
ARP Spoofing
Port Scanning
Explain Kerberos
notes on
79115
short note
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
79115
CMAC
the Block
note on
Perform encryption
note on
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
No. 1| is
vs CMAC
Hijacking
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
note on
Session Hijacking
any three
Explain
services.
and contrast
Explain Transposition
Algorithm
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
S/MIME services.
El-Gamal Algorithm
on (Any
encryption and
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
Diffie Hellman
the candidates,
Paper // Subject
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
candidates, if
Kerberos Protocol
Block Cipher
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A
contrast DES
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
Hellman Key
Four)
Protocol in
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
Needham-Schroeder
(Any Four)
1701225 -- T.E.(Information
Blowfish.
Transposition Ciphers
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
different
on Blowfish.
Subject Code:
DES and
any:-
compulsory.
three questions
on Stenography.
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
eavesdropping.
Cipher Modes
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
and decryption
detail.
on eavesdropping.
in detail.
AES.
Modes in
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
and AES.
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
Code: 32404
out of
protocol
Key Exchange
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
decryption using
Duration
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
T.E.(Information Technology
for
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
detail.
in detail.
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
Duration :: 3
Exchange with
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
using RSA
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
with illustrative
secret
PKI architectures
of remaining
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
Hours
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
architectures in
3 Hours
with suitable
key
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
remaining five
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
32404 // Cryptography
Example.
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
______________________
RSA algorithm
illustrative Example.
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
detail.
in detail.
Cryptography &
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
21B16FC4CF1CA58890D1D9013662E63A
Example.
algorithm with
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
suitable Example.
questions.
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
five questions.
distribution
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
& Network
Technology Engineering)(SEM-V)(Choice
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
with p=7,q=11,e=17
Security
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
suitable
Network Security
p=7,q=11,e=17
with suitable
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 8
Total
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90
(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)
(05)
(05)
Marks
(05)
(05)
(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D
Total Marks:
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9
Marks: 80
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01
32404 -- Cryptography
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01
&
66 E6 A 1B 6F C4 F CA 58 90 1 90 3
Cryptography &
2E 3A 21 16 C CF 1C 5 89 D1 D9 13
63 21 B1 FC 4C 1C A5 889 0D D 01 6
A2 B 6F 4 F1 A 88 0D 1D 90 36
1B 16F C4 CF CA 58 90 1D 90 136 62
16 C4 CF 1C 58 890 D1 9 13 62
A 0
Paper / Subject Code: 32404 / Cryptography & Network Security
T.E. SEM V/ IT / CHOICE BASED / NOV 2018 / 05.12.2018
N.B:
1. Question No. 1 is Compulsory.
2. Solve any THREE from Question No. 2 to 6.
3. Draw neat well labeled diagram wherever necessary.
Q.3 a) What are Block Cipher Modes. Describe any two in detail. (10)
b) Using Affine cipher, encrypt the Plaintext ‘SECURITY’ with key pair (10)
(5, 2).
Q.4 a) Given generator g= 2 and n=11. Using Diffie Hellman algorithm solve the (10)
following:
1. Show that 2 is primitive root of 11
2. IfA’s public key is 9, whatis A’s private key?
3. IfB’s public key is 3, what is B’s private key?
4. Calculate the shared secret key.
59727 .
86A0798576FOEC29F86CCD3F438074A5