REG NO:
BE / [Link] DEGREE EXAMINATIONS
[Link] [Link] ENGINEERING COLLEGE
SUDHANANDHEN KALVI NAGAR CHENNIMALAI, ERODE-638 112.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT TEST – II
Subject Code& Name: CB3491&Cryptography and cyber security
Semester:05
Date : 18.11.2024 Branch:CSE
Time : 2 Hours Maximum: 60
Marks
Answer ALL questions
Cos BT
PART - A (10*2=20 Marks)
L
1. State Fermat’s little theorem. 3 K1
Consider the RSA encryption method with p=11 and q=17 as the two 3 K3
2.
primes.
Find n and phi(n).
3. How the security of a MAC function expressed? 4 K2
4. What is the purpose of X.509 standard? 4 K1
5. List the properties a digital signature should possess. 4 K2
6. What do you mean by one way property in hash function? 4 K1
7.
Define anonymization. 5 K1
8.
Define cloud computing. 5 K1
9.
What is network access control? 5 K1
10. What are the elements of cyber crime? 5 K1
PART - B (4*10=40 Marks)
Users A and B use the Diffie-Hellman key exchange technique, a common 3 K3
prime q=11 and a primitive root alpha=7.
(i) If user A has private key XA=3. What is A’s public key YA?
11.a
(5)
(ii) If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Or
State Chinese Remainder theorem and find X for the given set of congruent 3 K2
equations using CRT.
11.b X=2(mod 3)
X=3(mod 5)
X=2(mod 7)
Discuss the roles of the different servers in Kerberos protocol. How does 4 K2
12.a
the user get authenticated to the different servers?
Or
Illustrate the steps involved in Signature generation and Verification
12.b 4 K1
functions of DSS.
Apply the MAC on the Cryptographic checksum method to authenticate 4 K3
13.a build confidentiality of the message where the authentication is tied to the
message M = 8376, K1 = 4892 and K2 = 53624071
Or
What is web security?Discuss web security [Link] transport
13.b 5 K1
layer security
What is keylogger?Explain types of keyloggers with its advantages
14.a 5 K1
and disadvantages.
Or
14.b What is cybercrime?Explain types of cybercrime. 5 K1
CO Apply the different cryptographic operations of public key cryptography
3
CO Apply the various Authentication schemes to simulate different applications.
4
CO Understand various cyber crimes and cyber security.
5
K1- Remembering K2- Understanding K3- Applying
K4- Analyzing K5- Evaluating K6- Creating
Course instructor Course Coordinator HOD/CSE
Principal
REG NO:
BE / [Link] DEGREE EXAMINATIONS
[Link] [Link] ENGINEERING COLLEGE
SUDHANANDHEN KALVI NAGAR CHENNIMALAI, ERODE-638 112.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT TEST – II
Subject Code& Name: CB3491&Cryptography and cyber security
Semester:05
Date : 18.11.2024 Branch:CSE
Time : 2 Hours Maximum: 60
Marks
Answer ALL questions
Cos BT
PART - A (10*2=20 Marks)
L
1. State Fermat’s little theorem. 3 K1
Consider the RSA encryption method with p=11 and q=17 as the two 3 K3
2. primes.
Find n and phi(n).
3. How the security of a MAC function expressed? 4 K2
4. What is the purpose of X.509 standard? 4 K1
5. List the properties a digital signature should possess. 4 K2
6. What do you mean by one way property in hash function? 4 K1
7. Define anonymization. 5 K1
8. Define cloud computing. 5 K1
9. What is network access control? 5 K1
10
. What are the elements of cyber crime? 5 K1
PART - B (4*10=40 Marks)
Users A and B use the Diffie-Hellman key exchange technique, a common 3 K3
prime q=11 and a primitive root alpha=7.
(iii) If user A has private key XA=3. What is A’s public key YA?
11.a
(5)
(iv) If user B has private key XB=6. What is B’s public key YB? (4)
(iii) What is the shared secret key? Also write the algorithm. (4)
Or
State Chinese Remainder theorem and find X for the given set of congruent 3 K2
equations using CRT.
11.b X=2(mod 3)
X=3(mod 5)
X=2(mod 7)
Discuss the roles of the different servers in Kerberos protocol. How does 4 K2
12.a
the user get authenticated to the different servers?
Or
Illustrate the steps involved in Signature generation and Verification
12.b 4 K1
functions of DSS.
13.a Apply the MAC on the Cryptographic checksum method to authenticate 4 K3
build confidentiality of the message where the authentication is tied to the
message M = 8376, K1 = 4892 and K2 = 53624071
Or
What is web security?Discuss web security [Link] transport
13.b 5 K1
layer security
What is keylogger?Explain types of keyloggers with its advantages
14.a 5 K1
and disadvantages.
Or
14.b What is cybercrime?Explain types of cybercrime. 5 K1
CO Apply the different cryptographic operations of public key cryptography
3
CO Apply the various Authentication schemes to simulate different applications.
4
CO Understand various cyber crimes and cyber security.
5
K1- Remembering K2- Understanding K3- Applying
K4- Analyzing K5- Evaluating K6- Creating
Course instructor Course Coordinator HOD/CSE
Principal