You are on page 1of 5

BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI, DUBAI CAMPUS

DUBAI INTERNATIONAL ACADEMIC CITY, DUBAI


FIRST SEMESTER 2021 – 2022 Questions: 5
DEPARTMENT OF COMPUTER SCIENCE

Question Paper
COURSE : Network Security (CS G513) HD

COMPONENT : Test 1 CLOSED BOOK WEIGHTAGE : 15% (15 Marks)


DATE : 5-October-2021 DURATION : 50 Minutes (7:00 pm-7:50 am)
Note:
1. Please write down any assumptions that you make.
2. Show the intermittant steps clearly for all answers.

Q. 1 Encrypt the plaintext “securityisimportant” using the Playfair cipher. Consider the
following secrete key for Playfair cipher to generate ciphertext. Show all steps of
calculating a ciphertext. 3M

L G D B A
Q M H E C
U R N I/J F
X V S O K
Z Y W T P

Q. 2 Answer the following questions. 3M


i. Differentiate between active attacks and passive attacks (Minimum four
correct differences).
ii. Describe any two fundamental security design principles.
iii. Define Group with all its properties.
Q. 3 Use the Vigenere cipher with keyword “HEALTH” to encipher the message 3 M
“lifeisfullofsurprises”. Show all steps of calculating a ciphertext.
Q. 4 Consider the following representation of plaintext and ciphertext in Z10. 3M
Plaintext a b c d e f g h i j
Ciphertext M N O P Q R S T U V
Value 0 1 2 3 4 5 6 7 8 9

i. What is key domain 𝑍10 for multiplicative cipher? Show all steps of
calculating key domain.
ii. Encrypt the plaintext “dfgia” using Affine cipher with key pair (7,3). Show
all steps of calculating ciphertext.
Q. 5 Encrypt the message “allthebestfortest1toall” using following transposition 3 M
techniques,
i. Keyless transposition cipher where, both sender and receiver agreed to use 4
columns and sender write the text row by row in 4 columns.
ii. Keyed transposition cipher with following key and agreed to divide
plaintext in to group of five characters each,

********** ALL THE BEST ********

1
BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI, DUBAI CAMPUS

DUBAI INTERNATIONAL ACADEMIC CITY, DUBAI


FIRST SEMESTER 2021 – 2022 Questions: 5
DEPARTMENT OF COMPUTER SCIENCE

Question Paper
COURSE : Network Security (CS G513) HD

COMPONENT : Test 2 OPEN BOOK WEIGHTAGE : 15% (15 Marks)


DATE : 9-November-2021 DURATION : 50 Minutes (7:00 pm-7:50 am)
Note:
1. Please write down any assumptions that you make.
2. Show the intermittant steps clearly for all answers.

Q. 1 Find the result of multiplying P1=x7+x6+x5+x2+x by P2=x7+x3+x2+x in GF (28) 3M


with irreducible polynomial (x8+x4+x3+x+1)

Q. 2 Consider a 3-round Feistel cipher with 8-bit plaintext with unknown round function. 3 M
You are given the following information:
i. E(1011 1100) = 1100 1011
ii. F(1100) = 0101

Fill the following table for i. E(1011 1100) = 1100 1011

1
Q. 3 Assuming the output of the first application (round) of fK of S-DES is 00101011 and 4 M
K2 is 10111001, what is the output ciphertext? You may use the information below,
IP: 2 6 3 1 4 8 5 7
E/P: 4 1 2 3 2 3 4 1
P4: 2 4 3 1
IP-1: 4 1 3 5 7 2 8 6

Mention your answer in following form,


Input:
Key:
Swap halves (SW):
E/P on right half:
XOR with K2:
Output of S0:
2
Output of S1:
P4:
XOR with left half:
IP-1
Ciphertext:

Q. 4 If the key with party bits (64-bits) in DES is 0123 ABCD 2562 1456, find the first- 3 M
round key.

Q. 5 Find the sub-byte transformation of following given state, 2M

00 12 0𝐶 08
State1 = 04 04 00 23
12 12 13 19
14 00 11 19

********** ALL THE BEST ********

3
BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI, DUBAI CAMPUS

DUBAI INTERNATIONAL ACADEMIC CITY, DUBAI


FIRST SEMESTER 2021 – 2022 Questions: 8
DEPARTMENT OF COMPUTER SCIENCE

Question Paper
COURSE : Network Security (CS G513) HD

COMPONENT : Comprehensive Exam WEIGHTAGE : 40% (40 Marks)


CLOSED BOOK
DATE : 28-December-2021 DURATION : 3 hrs (7:00 pm-10:00 pm)
Note:
1. Please write down any assumptions that you make.
2. Show the intermittant steps clearly for all answers.

Q. 1 John chooses p = 7 and q = 5. John select e0 = 3, r = 5, and d = 11. Assume h(M) = 6 M


7. Now John can send the message to Merry. Show complete signing and verification
process using Digital Signature Standard (DSS).

Q. 2 What is firewall? Write in brief about three different types of firewalls with its 4M
advantages and disadvantages.

Q. 3 Consider the following combination of bitstreams A, B, and C. Calculate the 6M


outcome of Majority and Condition operation as per the SHA-512.
i. A = 10100011, B = 10101010, C = 01011111
ii. A = 0111, B = 1010, C = 1110
Q. 4 Consider a Public key = (2,9,13), Private key = 5, r = 4, and Plaintext = 11. 4M
i. Calculate the ciphertext pair (C1, C2) using El-Gamal asymmetric key
cryptographic technique.
ii. For ciphertext pair obtain in (i) generate the plaintext using El-Gamal
asymmetric key cryptographic technique.
Q. 5 i. Compare controlled trusted center and certification authority with respect to 2+2M
public key distribution.
ii. List the servers used in Kerberos and define role of each server in one
sentence.
Q. 6 Generate the Ciphertext using RC4 for plaintext, P = [1 3 3 3]. Consider the state 8M
vector S is 8 x 3-bits and we are operating on 3-bits of plaintext at a time since S can
take the values 0 to 7, which can be represented as 3 bits. Assume we use a 4 x 3-bit
key of K = [2 5 3 6].
Q. 7 Create the Linear Feedback Shift Register (LFSR) for following, 4M
i. B4 = B3 + B2 + 1
ii. B3 = B2 + B1 + 1
Q. 8 Encrypt the message “this is an exercise” using following ciphers, 4M
i. Additive cipher with key = 20
ii. Affine cipher with key = (15,20)

********** ALL THE BEST ********

You might also like