You are on page 1of 2

USN 18EC752

Page 1 of 2
B. E. Degree (Autonomous) SEVENTH Semester End Examination (SEE), Feb 2022

CRYPTOGRAPHY
Model Question Paper 2
Time: 3 Hours [ Maximum Marks: 100]

Instructions to students: Answer any 5 full questions CO RBT

1 a) With a neat diagram, discuss the functioning of network security model. 06 M CO1 L1
List four basic tasks of designing security model.

b) Define passive and active security attacks. Discuss the functioning of 7 M CO1 L1,L2
following attacks with diagrams. i) Masquerade ii) Reply iii)
Modifications of messages iv) Denial of service.
c) Design a Hill Cipher and transmit a plain text message “TEXT” given 7M CO1 L1,L2
3 3
key as 𝐾 = [ ]. Also decrypt the ciphertext which is transmitted
2 5
15 17
using the inverse key matrix given by 𝐾 −1 = [ ]
20 9

OR

a) What are the essentials ingredients of a symmetric cipher? 7M CO1 L1,L2


2
b) Use the Vigenere Cipher with keyword “HEALTH” to encipher the 7 M CO1 L1
message “Life is full of surprises”.

c) Write a note on one time pad. What are the two problems with one time pad? 6 M CO1 L1,L3

3 a) Find multiplicative inverse of each non zero element in Z5. 6M CO2 L1

b) Determine GCD(24140, 16762). 8M CO2 L1,l2

c) Does a residue classes modulo 3 forms a group with respect to i) 6 M CO2 L3


Addition? ii) Multiplication?

OR

4 a) Find zero-divisors and unit elements for the given set 6M CO2 L3
S = {0,1,2,3,4,5,6,7,8,9}+, X mod10

b) Check whether S = {0, 1, 2, 3} +, x mod 4 is a Field? 8M CO2 L1.L2

c) Let f(x) = x3 + x2 + 2 and g(x) = x2 – x +1. Find, 6 M CO2 L3

i) f(x) + g(x), ii) f(x) - g(x), iii) f(x) x g(x), and iv) f(x)/g(x)
5 a) With a block diagram, explain DES encryption and key generation CO3 L2,l3
8M
technique
b) What were the criteria for AES evaluation? 6M CO3 L2,l3

Dr. Ambedkar Institute of Technology, Bangalore – 560056


(An Autonomous Institution Affiliated to Visvesvaraya Technological University, Belgaum)
Page 2 of 2

c) Explain how S-box is constructed in AES algorithm. 6M CO3 L2,l3

OR
6 a) Briefly describe the single round of DES algorithm. 10 M CO3 L2,L3
b) Design the sub keys, K1 and K2 for a Simplified – DES algorithm given CO3
10 M L2,L3
the master key as K = 1 0 1 0 0 0 0 0 1 0.
7 a) In a Diffie-Hellman key exchange two parties agree on ơ = 353 and q CO4
= 3. A chooses Xa = 97 and B chooses Xb = 253. Find the common 10 M L1,L3
key generated by them.
b) With an example, explain RSA algorithm. 10 M
CO4 L1,L3
OR

8 a) Describe the three methods used in distribution of Private keys. 10 M CO4 L1,L3
b) In a public key system using RSA, you intercept the cipher text C = 10 CO4
sent to a user whose public key is e = 5, n = 35. What is the plaintext 10 M L1,L3
M?
9 a) What do you mean by Message Authentication? Mention and explain CO5 L1,L2
10 M
in brief the three types of message authenticators. ,L3
b) With neat block diagrams explain the basic uses of MAC. 10 M CO5 L1,L2
,L3
OR
10 a) List the requirements of a Hash Function and describe briefly simple CO5 L1,L2
Hash Functions. 10 M ,L3

b) Differentiate between Hash Functions and MAC functions. CO5 L1,L2


10 M ,L3

*****************************

Dr. Ambedkar Institute of Technology, Bangalore – 560056


(An Autonomous Institution Affiliated to Visvesvaraya Technological University, Belgaum)

You might also like