Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
17 views

Cst433 Security in Computing, December 2022

Uploaded by

anzilrashe2002
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Cst433 Security in Computing, December 2022

Uploaded by

anzilrashe2002
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B 1000csT433122202

Reg No.:

APJ ABDUL KAL,{M TECIINOLOGICAL UNIVERS


Seventh Semester B.Tech Degree Examination December 2022 (2019

Course Code: CST433


Course Name: SECURITY IN COMPUTING
Max. Marks: 100 Duration: 3 Hours

PART A
Answer all questions, each carries 3 marks.
I lllustrate the two approaches to attack a conventional encryption scheme. (3)
2 Use an Affine cipher to encrypt the message 'its cool' with the key pair(5,8) in (3)
modulus 26.
3 Differentiate block cipher and stream cipher. (3)
4 Explain Triple DES encryption with two keys and three keys. (3)
5 Compare symmetric and asymmetric cryptosystems. (3)
6 Illustrate man in the middle attack on Diffie Hellman key exchange algorithm. (3)
7 List any three applications of cryptographic hash function. (3)
8 How digital signature is implemented using the RSA approach? (3)
9 What are the three classes of intruders? (3)
l0 Explain different techniques used to avoid guessable passwords. (3)
PART B
Answer any onefull questionfrom each module, each carries 14 marks.
1l a) List and explain the categories of passive attack and active attack. (7)
t b) Explain Vigenere cipher. Using Vigenere cipher encrypts the word 'CYBER (7)

SECURITY' usi:.9 the key 'BEST.


.oR
12 a) Explain OSI security architecture. (9)
fl
b) Encrypt the text "welcome to network securi$!" using a transposition cipher with (5)

the key 'LAYER' (spaces are omitted during encryption).


Module ll
l3 a) Explain a single round of DES algorithm with a neat diagram. (8)
b) Surtmarize the operations of the stream cipher RC4 (6)
OR
14 a) Explain AES algorithm in detail. (e)

Page 1of2

Downloaded from Ktunotes.in


1000csT433122202

b) List out the block cipher modes of operations. Describe any two block cipher (5)
modes of operation{
Module lll
15 a) Explain RSA algorithm. In a RSA cryptosystem a user A uses two prime (8)

numbers p : l3 and q=17 to generate her public and private keys. If the public
key of Ais 35. Find the private key of A.
b) Demonstrate Diffie Hellman Key exchange algorithm. (6)

OR

16 a) Illustrate ElGamal cryptosystem. Consider an ElGamal scheme with a common (9)

prime q:71and a primitive root o.:7.If B has a public key Yn : 3 and

A chooses the random number k=2, what is the cipher text of the message
M:30?
b) Explain the key exchange procedure using Elliptic Curves cryptography. (5)

Module lV
17 a) Illustrate the working of SHA-512 algorithm with diagrams. (9)

b) Explain different attacks and forgeries on digital signatures. (5)

OR

18 a) How is signing and verification done in the Digital Signaturealgorithm? (7)

b) Describe hash based message authentication code (HMAC). (7)

Module V
19 a) distribution.
Describe the different techniques for public key (8)

b) What il;r worm? Explain different methods to defense worm. (6)

OR

n 20 a) Discuss about different intrusion detection techniques. , (8)

b) Explain different types of Simple Dffi afiack and its countermeasures. (6)

Page2of2

Downloaded from Ktunotes.in

You might also like