Professional Documents
Culture Documents
Page 1 of 2
B. E. Degree (Autonomous) SEVENTH Semester End Examination (SEE), Feb 2022
CRYPTOGRAPHY
Model Question Paper 2
Time: 3 Hours [ Maximum Marks: 100]
1 a) With a neat diagram, discuss the functioning of network security model. 06 M CO1 L1
List four basic tasks of designing security model.
b) Define passive and active security attacks. Discuss the functioning of 7 M CO1 L1,L2
following attacks with diagrams. i) Masquerade ii) Reply iii)
Modifications of messages iv) Denial of service.
c) Design a Hill Cipher and transmit a plain text message “TEXT” given 7M CO1 L1,L2
3 3
key as 𝐾 = [ ]. Also decrypt the ciphertext which is transmitted
2 5
15 17
using the inverse key matrix given by 𝐾 −1 = [ ]
20 9
OR
c) Write a note on one time pad. What are the two problems with one time pad? 6 M CO1 L1,L3
OR
4 a) Find zero-divisors and unit elements for the given set 6M CO2 L3
S = {0,1,2,3,4,5,6,7,8,9}+, X mod10
i) f(x) + g(x), ii) f(x) - g(x), iii) f(x) x g(x), and iv) f(x)/g(x)
5 a) With a block diagram, explain DES encryption and key generation CO3 L2,l3
8M
technique
b) What were the criteria for AES evaluation? 6M CO3 L2,l3
OR
6 a) Briefly describe the single round of DES algorithm. 10 M CO3 L2,L3
b) Design the sub keys, K1 and K2 for a Simplified – DES algorithm given CO3
10 M L2,L3
the master key as K = 1 0 1 0 0 0 0 0 1 0.
7 a) In a Diffie-Hellman key exchange two parties agree on ơ = 353 and q CO4
= 3. A chooses Xa = 97 and B chooses Xb = 253. Find the common 10 M L1,L3
key generated by them.
b) With an example, explain RSA algorithm. 10 M
CO4 L1,L3
OR
8 a) Describe the three methods used in distribution of Private keys. 10 M CO4 L1,L3
b) In a public key system using RSA, you intercept the cipher text C = 10 CO4
sent to a user whose public key is e = 5, n = 35. What is the plaintext 10 M L1,L3
M?
9 a) What do you mean by Message Authentication? Mention and explain CO5 L1,L2
10 M
in brief the three types of message authenticators. ,L3
b) With neat block diagrams explain the basic uses of MAC. 10 M CO5 L1,L2
,L3
OR
10 a) List the requirements of a Hash Function and describe briefly simple CO5 L1,L2
Hash Functions. 10 M ,L3
*****************************