Save as PDF

Opens your browser print dialog — select "Save as PDF" to download.

Total No. of Questions: 8]
[Total No. of Printed Pages: 2
[2]
Roll No
MTCF-105
M.E./M.Tech. I Semester
Examination, November 2022
Cryptography and Network Security
Time: Three Hours
Maximum Marks: 70

Note: i) Attempt any five questions.

ii) All questions carry equal marks.

1. a) Describe Triple DES and give its applications.
b) Explain the Key Expansion process in AES.
2. a) Explain in detail the Feistel Block Cipher structure with a neat sketch.
b) Using Diffie-Hellman key exchange algorithm, find B's public key and shared key if user B has a Private key Xb = 3, a common prime q = 33 and a primitive α = 8.
3. a) Using RSA Algorithm
  1. Perform encryption and decryption using the values p = 3, q = 11, e = 7 and M = 5
  2. Find n, d if p = 19, q=23, e = 3 and Encrypt the message "BHOPAL".
b) Explain the architecture of Elliptic curve cryptography and write the advantages of it.
4. a) Explain in detail any three Substitution techniques for encryption and decryption with suitable examples.
b) Write in detail about Security Attacks and Security Services.
5. a) Explain the following
  1. Phishing
  2. DDoS
  3. Format String Attacks
b) What protocols comprise SSL? Explain in detail the SSL Handshake protocol.
6. a) What is an X.509 certificate? Explain in detail X.509 certificate format.
b) Explain how the authentication header is implemented in Transport and Tunnel modes?
7. a) Explain in detail the operation of Internet Key Exchange with a suitable example.
b) Write a short notes on rule based Intrusion Detection.
8. Write short notes on any three of the following
  1. SQL injection
  2. Digital Signature Standards and Digital Signature
  3. Virus and worms
  4. Traffic confidentiality
  5. Passwords and Key management