Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cst433 Security in Computing, May 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

B 1000csT433122205

Reg No.:

APJ ABDUIT KALAM TECHNOLOGICAL UNTV


Seventh Semester B.Tech Degree (S, FE) ExaminationMay 2023

Course Code: CST433


Course Name: SECURITY IN COMPUTING
Max. Marks: 100 Duration: 3 Hours
PART A
marks.
Answer all questions, each carries 3 Marks

I Use Playfair Cipher with key COMPUTER to encrypt the message (3)
..CRYPTOGRAPHY".

2 Differentiate between passive attack and active affack. (3)


a
J What is avalanche effect? (3)

4 What is the purpose of S Box in DES? (3)

5 In RSA, given p=l l, j:7, public key(e):l l, find n, 0(n) and private key(d). (3)

6 Illustrate man in the middle attack on Diffie Hellman key exchange algorithm. (3)

7 Give the requirements of MAC function. (3)

8 What do you mean by one way property in hash function? (3)

9 List any two ways in which secret keys can be distributed to two communicating (3)
parties.

l0 List three different classes of intruders. (3)

PART B
Answer ony one full question from eoch module, each corries 14 morks.
Module I

ll a) Explain transposition technique. Convert plain text to Cipher text using Rail Fence (7)

technique "COMPUTER ENGINEqRING". '


b) Explain about OSI Security architecture model with neat diagram. (7)
OR
12 a) Convert "MEET ME" using Hill cipher with the key matrix .Explain how (8)
decryption can be performed.

177 17 sl
lzt 18 zLl
L2 2 LgJ
b) What are the two ways of attacking conventional encryption scheme? Explain (6)

Page 1of2
'i

1000csT433122205

Module ll
(e)
l3 a) Summarize the primitive operlations of RC4 algorithm'
(s)
b) Explain construction of S Box in AES
OR
(10)
14 a) Illustrate AES encryption in detail'
(4)
b) How is round key generated in DES?
Module lll
(7)
15 a) Explain RSA cryptosystem. In an RSA cryptosystem a participant A uses two
primenumbersp:l3andq:lTtogeneratepublickeyandprivatekey.The
public key of A is 35. Find the private key of A.
(7)
b) Explain in detail about elliptic curve cryptography'
OR

l6 a) Consider a Diffie-Hellman scheme with a common prime q:I1 and a primitive (8)

toot u:2.
i) Show that2 is a primitive root of I l.
ii; If User A has public key YA:9, what is A's private key XA?
iii; If User B has public kiy YB= 3, what is the shared secret key K, shared with
A?
(6)
b) Illustrate ElGamal cryptosystem.
Module lV
(10)
17 a) Describe about Hash Function. How its algorithm is designed? Explain its features
& properties?
(4)
'b) Uow iigning and verification is done in Digital Signature algorithm?
OR
(8)
18 a) Explain Cipher - Based Message Authentication Code'
(6)
b) Describe the digital signature schemes DSS.
Modu.[d
(7)
t9 a) Explain secret key distribution with confidentiality and authentication.
(7)
b) Explain about viruses in detail.

(e)
20 a) Explain about Malicious Software.
(5)
b) Explain decentralized key control.
****

PageZof2

You might also like