0% found this document useful (0 votes)
40 views4 pages

Cryptography and Cybersecurity Test

This document outlines the internal assessment test for the Cryptography and Cyber Security course at M.P. Nachimuthu M. Jaganathan Engineering College. It includes details about the exam structure, with questions covering topics like Fermat's theorem, RSA encryption, MAC functions, digital signatures, and cybercrime. The test consists of two parts, with a total of 60 marks available.

Uploaded by

cseraghul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views4 pages

Cryptography and Cybersecurity Test

This document outlines the internal assessment test for the Cryptography and Cyber Security course at M.P. Nachimuthu M. Jaganathan Engineering College. It includes details about the exam structure, with questions covering topics like Fermat's theorem, RSA encryption, MAC functions, digital signatures, and cybercrime. The test consists of two parts, with a total of 60 marks available.

Uploaded by

cseraghul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

REG NO:

BE / [Link] DEGREE EXAMINATIONS


[Link] [Link] ENGINEERING COLLEGE
SUDHANANDHEN KALVI NAGAR CHENNIMALAI, ERODE-638 112.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT TEST – II
Subject Code& Name: CB3491&Cryptography and cyber security
Semester:05
Date : 18.11.2024 Branch:CSE
Time : 2 Hours Maximum: 60
Marks
Answer ALL questions
Cos BT
PART - A (10*2=20 Marks)
L
1. State Fermat’s little theorem. 3 K1

Consider the RSA encryption method with p=11 and q=17 as the two 3 K3
2.
primes.
Find n and phi(n).
3. How the security of a MAC function expressed? 4 K2

4. What is the purpose of X.509 standard? 4 K1

5. List the properties a digital signature should possess. 4 K2

6. What do you mean by one way property in hash function? 4 K1

7.
Define anonymization. 5 K1
8.
Define cloud computing. 5 K1
9.
What is network access control? 5 K1
10. What are the elements of cyber crime? 5 K1
PART - B (4*10=40 Marks)
Users A and B use the Diffie-Hellman key exchange technique, a common 3 K3
prime q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3. What is A’s public key YA?
11.a
(5)
(ii) If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Or
State Chinese Remainder theorem and find X for the given set of congruent 3 K2
equations using CRT.
11.b X=2(mod 3)
X=3(mod 5)
X=2(mod 7)
Discuss the roles of the different servers in Kerberos protocol. How does 4 K2
12.a
the user get authenticated to the different servers?
Or
Illustrate the steps involved in Signature generation and Verification
12.b 4 K1
functions of DSS.
Apply the MAC on the Cryptographic checksum method to authenticate 4 K3
13.a build confidentiality of the message where the authentication is tied to the
message M = 8376, K1 = 4892 and K2 = 53624071
Or
What is web security?Discuss web security [Link] transport
13.b 5 K1
layer security
What is keylogger?Explain types of keyloggers with its advantages
14.a 5 K1
and disadvantages.
Or
14.b What is cybercrime?Explain types of cybercrime. 5 K1

CO Apply the different cryptographic operations of public key cryptography


3
CO Apply the various Authentication schemes to simulate different applications.
4
CO Understand various cyber crimes and cyber security.
5

K1- Remembering K2- Understanding K3- Applying


K4- Analyzing K5- Evaluating K6- Creating

Course instructor Course Coordinator HOD/CSE


Principal
REG NO:

BE / [Link] DEGREE EXAMINATIONS


[Link] [Link] ENGINEERING COLLEGE
SUDHANANDHEN KALVI NAGAR CHENNIMALAI, ERODE-638 112.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT TEST – II
Subject Code& Name: CB3491&Cryptography and cyber security
Semester:05
Date : 18.11.2024 Branch:CSE
Time : 2 Hours Maximum: 60
Marks
Answer ALL questions
Cos BT
PART - A (10*2=20 Marks)
L
1. State Fermat’s little theorem. 3 K1
Consider the RSA encryption method with p=11 and q=17 as the two 3 K3
2. primes.
Find n and phi(n).
3. How the security of a MAC function expressed? 4 K2
4. What is the purpose of X.509 standard? 4 K1
5. List the properties a digital signature should possess. 4 K2
6. What do you mean by one way property in hash function? 4 K1
7. Define anonymization. 5 K1
8. Define cloud computing. 5 K1
9. What is network access control? 5 K1
10
. What are the elements of cyber crime? 5 K1
PART - B (4*10=40 Marks)
Users A and B use the Diffie-Hellman key exchange technique, a common 3 K3
prime q=11 and a primitive root alpha=7.
(iii) If user A has private key XA=3. What is A’s public key YA?
11.a
(5)
(iv) If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Or
State Chinese Remainder theorem and find X for the given set of congruent 3 K2
equations using CRT.
11.b X=2(mod 3)
X=3(mod 5)
X=2(mod 7)
Discuss the roles of the different servers in Kerberos protocol. How does 4 K2
12.a
the user get authenticated to the different servers?
Or
Illustrate the steps involved in Signature generation and Verification
12.b 4 K1
functions of DSS.
13.a Apply the MAC on the Cryptographic checksum method to authenticate 4 K3
build confidentiality of the message where the authentication is tied to the
message M = 8376, K1 = 4892 and K2 = 53624071
Or
What is web security?Discuss web security [Link] transport
13.b 5 K1
layer security
What is keylogger?Explain types of keyloggers with its advantages
14.a 5 K1
and disadvantages.
Or
14.b What is cybercrime?Explain types of cybercrime. 5 K1

CO Apply the different cryptographic operations of public key cryptography


3
CO Apply the various Authentication schemes to simulate different applications.
4
CO Understand various cyber crimes and cyber security.
5

K1- Remembering K2- Understanding K3- Applying


K4- Analyzing K5- Evaluating K6- Creating

Course instructor Course Coordinator HOD/CSE


Principal

You might also like