You are on page 1of 8

4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT

25_11_IT_Sem-V_R19_CNS_FAMT
1) The Question Paper will have MCQs (for 20 marks) and Subjective/Descriptive Questions
(for 60 marks).

2) MCQ correct options and subjective question answers to be written on A4 size papers.
Scan all pages of answer papers of Q.1 to Q.4 and create single file in pdf format to upload in
the link given.

* Required

1. Email *

2. Enter your Name *

3. Enter your Seat Number *

1) The Question Paper will have MCQs (for 20 marks) and


Subjective/Descriptive Questions (for 60 marks).

2511_IT_Sem- 2) MCQ correct options and subjective question answers to be written on A4


V_R19_CNS_FAMT size papers. Scan all pages of answer papers of Q.1 to Q.4 and create single
file in pdf format to upload in the link given.

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 1/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT

Q.1) 1 to 5

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 2/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT

Q.1) 6 to 10

Q.2

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 3/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT

Q.3 & Q.4

4. Upload your answer papers *

Files submitted:

5. Have you uploaded required pdf file of answers? *

Mark only one oval.

Yes

This content is neither created nor endorsed by Google.

 Forms

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 4/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 5/5
FB A8 093 2F8 3D 989 5B A53 BE 353 DA
A 09 2F 3D 98 5B A5 B 35 D 88
A8 8093 32F 83D 989 95B A5 3BE E353 3DAA88 A89
0 8 9 A 3 3 A
80 932 2F83 3D9 895 5BA 53B BE3 53DDA8 88A 89F FBA
93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
09 2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93
3 9 3 9
93 2F8 83D 989 5BAA53 3BE 353 DA 88AA89 FBAA80 0932 2F83
2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93 F8 D
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98
F D 89 B 53 E 53 A 8 89 B 80 3 8 9 9

N. B:
F8 83D9 989 5BAA53 BE 353 DA 88AA89 FBAA80 932 2F83 3D9 895 5BA
3 5 B 3 D 8 F 9 F 8 5

59728
c)
d)

Q. 2 a)
83 D98 895 BA 53B E35 53D A8 8A8 89F BA8 809 32F 83DD98 95B BA5 3BE

b)
b)
b)
b)

Q. 5 a)
Q. 4 a)
Q. 3 a)
Q. 1 a)

b)
D9 95 BA 53 E3 3D A8 8A 9F BA 09 32 83 9 95 A 3B 3
D9 895 BA 53 BE3 53D A8 8A 89F BA 809 32 F83 D9 895 BA 53B E3 53D
8 B 5 8 F D 8 B 5 E 5 A
98 95B BA5 53BE E35 3DAA88 8A8 9FB BA8 8093 32F8 83D 989 95B A53 3BE 353 3DA 88A
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D

advantages.
Triple DES?
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE

the help of a KDC.

distributed systems
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
32404 - Cryptography & Network Security

3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
Monday, May 27, 2019 02:30 pm - 05:30 pm

95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8

the need of AH and ESP.


in the handshake process.
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F

mounted at various layers.


1. Question No. 1 is Compulsory.

Explain the steps involved.


53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8

and d using RSA. Encrypt M=5.


A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
59728

8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98

algorithm iii) El-Gamal Algorithm


89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA

Compare and contrast DES and AES.


A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE
2. Solve any THREE from Question No. 2 to 6.

32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
3. Draw neat well labeled diagram wherever necessary.
Time (3 Hours)

must be met and enlist mechanisms for the same.

****************
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98

88A89FBA80932F83D9895BA53BE353DA
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
Define ARP spoofing with an example. Compare with IP spoofing.

98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A


95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
What is the significance of a digital signature on a certificate? Justify

BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
Paper / Subject Code: 32404 / Cryptography & Network Security

35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932


Given modulus n=221 and public key, e=7, find the values of p, q, phi(n),

Define DOS attack. Show the different ways by which this attack can be
Two uses wish to establish a secure communication channel and exchange

protocol which can be used to set up a secure communication channel and


Encrypt “This is the final exam” with Playfair cipher using key “Guidance”.

A user wishes to do online transactions with Amazon.com. Discuss a


a session key after mutual authentication. Show how this can be done with
What is the drawback of Double DES algorithm? How is it overcome by
A secure e-voting system is to be designed. Discuss the security goals that

Q. 6 b) How does IPSec help to achieve authentication and confidentiality? Justify


provide server side and client side authentication. Show the steps involved

What is a firewall? Explain different types of firewalls and list their

Q. 6 a) Write short notes on(any two): i) Email security ii) Diffie Hellman
Show how Kerberos protocol can be used to achieve single sign-on in
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D
[Total Marks 80]

A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D


09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 98
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 9

(10)
(10)
(5)

(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)

3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53
3D 8 A8 9F A 09 2F 3D 98 5B A5
1T01225 - T.E. (INFORMATION TECHNOLOGY) (Sem V) (Choice Based) /

A8 8A 9F BA 809 32F 83 98 95B A5 3B


8A 89F BA 80 32 83 D9 95 A 3B
89 BA 80 932 F83 D9 895 BA 53B E
6F 4 F CA 8 0 1 90 36 2
6F C4C CF1 1CA 588 890DD1DD90 136 62E E63A
C F C 58 9 1 9 13 62 6 2
C4 4CF 1CAA58 890 0D1 D90 0136 662 E63 3A2 1B1
CF 1C 58 89 D1 D9 13 62 E63 A2 1B 6F
4C 1C A5 8 0D D 01 66 E6 A 1B 16 C4
9 9 F
CF F1C A58 889 0D1 1D9 013 3662 2E63 3A2 21B 16F C4C CF1
1 A 8 0 D D 0 6 E A 1 1 6 C C
F1 CA 588 90D 1D 901 136 62E 63A 21 B16 FC 4CF F1C A5
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88
CA 58 890 D1 D90 136 62E 63 A21 B1 6FC 4C F1C A5 88 90D
8 D D 1 A 6 F 9 1

79115
Q. No.
A5 5889 90D 1D 901 366 62E6 63A 21B B16 FC4 4CF 1CAA58 8890 0D1 D90
9 3 F
88 0D 1D 01 66 2E 3A 21 16 C CF 1C 58 89 D1 D9 13
58 90 1 90 36 2 63 2 B1 FC 4C 1C A5 8 0D D 01 66
8 D E 1 9 9
88 90DD1D 901 1366 62E 63AA21 B16 6FC 4CF F1C A58 889 0D1 1D9 013 3662 2E6
90 1D 90 36 2E 63 21 B1 FC 4C 1C A5 89 0D D 01 66 E6 3A
Network Security

89 D1 9 13 62 6 A2 B 6F 4 F1 A 88 0 1D 90 36 2E 3 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F

diagram.
and M=8.
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF

iv) Honeypot
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89

ii) ARP Spoofing


iii) Port Scanning
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
79115

16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D

i) HMAC vs CMAC
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90

vi) Session Hijacking


4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13

(d) List S/MIME services.

v) EI-Gamal Algorithm
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1

Q. 6 Write short notes on (Any Four)


1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
(c) Write a short note on Blowfish.
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
Instructions to the candidates, if any:-
N.B. : (1) Question No. 1 is compulsory.

(b) Write short note on Stenography.


13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
Q.1 (a) Write short note on eavesdropping.

2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A

Q.4 (a) Explain Kerberos Protocol in detail.


63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58

(b) Compare and contrast DES and AES.


A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90

(b) Describe the Block Cipher Modes in detail.


4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
Duration : 3 Hours

1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F


90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C

______________________
Q.2 (a) Explain Transposition Ciphers with illustrative Example.

2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A

(b) What Is PKI. Explain different PKI architectures in detail.


63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D

21B16FC4CF1CA58890D1D9013662E63A
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D

Q. 5 (a) Explain Diffie Hellman Key Exchange with suitable Example.


FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
(2) Attempt any three questions out of remaining five questions.

4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13


F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
Paper / Subject Code: 32404 / Cryptography & Network Security

Q.3 (a) Perform encryption and decryption using RSA algorithm with p=7,q=11,e=17

(b) Explain Needham-Schroeder protocol for secret key distribution with suitable
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 8
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90
(05)
(05)

(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)

4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890


Marks

F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9
Total Marks: 80

1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01
66 E6 A 1B 6F C4 F CA 58 90 1 90 3
25-Nov-2019 1T01225 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base) / 32404 - Cryptography &

2E 3A 21 16 C CF 1C 5 89 D1 D9 13
63 21 B1 FC 4C 1C A5 889 0D D 01 6
A2 B 6F 4 F1 A 88 0D 1D 90 36
1B 16F C4 CF CA 58 90 1D 90 136 62
16 C4 CF 1C 58 890 D1 9 13 62
A 0

You might also like