Name :
Roll No. : ...
Invigilator's Signature : .
CS/B.Tech/CSE/SEM-8/CS-802D/2013
2013
NETWORK SECURITY
Time Allotted : 3 Hours
Full Marks : 70
om
The figures in the margin indicate full marks.
Candidates are required to give their answers in their own words
as far as practicable
bu
t.c
GROUP A
( Multiple Choice Type Questions )
1.
Choose the correct alternatives for the following :
10
Which one of the following is active attack ?
yw
i)
a)
Masquerade
b)
Traffic analysis
c)
Eaves ropping
d)
Shoulder surfing.
m
ii)
iii)
8305
1 = 10
Which one of the following is passive attack ?
a)
Masquerade
b)
Traffic analysis
c)
Replay attack
d)
Denial of service.
Key used in the symmetric key cryptography is called
a)
Public key
b)
Session key
c)
Permanent key
d)
Secret key.
[ Turn over
CS/B.Tech/CSE/SEM-8/CS-802D/2013
v)
vi)
vii)
Key used in the asymmetric key cryptography is called
a)
Public key
b)
Session key
c)
Permanent key
d)
Private key.
Number of keys used in Public key cryptography is
a)
b)
c)
d)
8.
Chosen Cipher text attack is based on
a)
Cryptoanalysis
c)
Encryption
b)
Cryptography
d)
Decryption.
om
iv)
Authentication service that can be used on Windows
bu
t.c
platform is
a)
DES
b)
RSA
c)
KERBEROS
d)
MD5.
viii) A firewall that u es two TCP connections is
Bastion
b)
Application Gateway
c)
Circui level Gateway
yw
a)
ix)
x)
8305
Packet Filter.
A virus that cannot be detected by Antivirus Software is
a)
Parasitic
b)
Polymorphic
c)
Stealth
d)
Worm.
An attack on Authenticity is
a)
Interruption
b)
Interception
c)
Fabrication
d)
Violation.
CS/B.Tech/CSE/SEM-8/CS-802D/2013
GROUP B
( Short Answer Type Questions )
Answer any three of the following.
5 = 15
2.
What is a digital envelope ? Explain, how it works.
2+3
3.
Explain suitable Cipher Feedback mode with a suitable
diagram.
4.
Differentiate between transport
and
tunnel
modes
of
operation of IPsec.
Explain briefly the working principle of HMAC.
6.
What are the differences between symmetric key and
om
5.
asymmetric key cryptography ? What is ma querade ? 3 + 2
7.
bu
t.c
GROUP C
( Long Answer Type Questions )
Answer any three of the following.
15 = 45
a)
What are the four main stages in AES operation ?
b)
Let the state matrix in any intermediate stage of AES is
21
76
50
76
yw
ac
02
13
92
34
ea
46
ab
ec
02
a4
Ba
What would be the state matrix after the Shift Row
Oper tion ?
c)
In an AES cryptosystem the Round Key for Round 6 is
EA BC 73 23 45 67 32 87 E2 3D 9B 02 33 4E A2 F0
Find the first 4 bytes of the Round key for round 7.
The values of RC[j] in Hexa-decimal is given as follows :
J
10
RC[j]
01
02
04
08
10
20
40
80
1B
36
8
8305
[ Turn over
CS/B.Tech/CSE/SEM-8/CS-802D/2013
8.
a)
What would be the transformation of a message 'We the
people of India' using Rail Fence technique ?
b)
Explain the Diffie-Hellman key exchange mechanism.
With an example explain the man-in-the middle attack
in the Diffie-Hellman key exchange algorithm.
a)
What are different algorithm modes ? Explain those
4
b)
State and explain how IDEA works.
c)
For a Vernam Cipher do the following :
10. a)
b)
om
which are applied on block ciphers.
i)
Using pad "ARE" encode "TZP"
ii)
Using pad "ARX" decode "YFR".
bu
t.c
9.
6+5
Write down RSA algorithm.
In an RSA system the public key of a user is 17 and
c)
yw
N = 187. What will be the private key of this user ?
What is the difference between MAC and Message
Digest ?
11. Write short notes on any three of the following :
a)
D gital signature
b)
RC5
c)
DES
d)
SHA
e)
SSL and TLS.
8305