0% found this document useful (0 votes)
221 views2 pages

Cs 703 A Cryptography and Information Security Dec 2020

This document appears to be an exam for a Cryptography and Information Security course. It contains 8 questions worth a total of 70 marks. Students must attempt any 5 questions, with each question worth an equal number of marks. The questions cover topics like cryptanalysis, the RSA algorithm, hash functions, digital signatures, SSL handshakes, IPSec architecture, firewalls, and security tools.

Uploaded by

Rahul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
221 views2 pages

Cs 703 A Cryptography and Information Security Dec 2020

This document appears to be an exam for a Cryptography and Information Security course. It contains 8 questions worth a total of 70 marks. Students must attempt any 5 questions, with each question worth an equal number of marks. The questions cover topics like cryptanalysis, the RSA algorithm, hash functions, digital signatures, SSL handshakes, IPSec architecture, firewalls, and security tools.

Uploaded by

Rahul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] [1] [Total No.

of Printed Pages : 2

Roll No ..................................
CS-703(A)-CBGS
B.Tech., VII Semester
Examination, December 2020
Choice Based Grading System (CBGS)
Cryptography and Information Security
Time : Three Hours
Maximum Marks : 70
Note: i) Attempt any five questions.
ii) All questions carry equal marks.

1. a) Explain the concept of Cryptanalysis and Brute force


attack. 7
b) Explain Fermat’s little theorem with an example. 7

2. a) Explain RC4 cipher with the help of suitable example. 7


b) Define encryption and decryption in RSA algorithm using
suitable example and how to determine the strength of
RSA algorithm. 7

3. a) Explain the compression of Secure Hash Algorithm. 7


b) Explain Chinese Remainder Theorem. Using CRT find ‘X’
from the equations. 7
X ≅ 7 mod 13 and X ≅ 11 mod 12

4. a) Describe the steps in finding the message digest using


SHA-512 algorithm. What is the order of finding two
messages having the same message digest? 7
b) Define the generation and verification of the digital
signature using Digital Signature standard algorithm. 7
CS-703(A)-CBGS PTO

https://www.rgpvonline.com
[2]

5. a) Explain about SSL Handshake protocol. 7


b) What are the different servers used in Kerberos? Explain
the role of each one. 7

6. a) Explain about IPSec architecture and security association.


7
b) Define elliptic curves and explain their application in
cryptography. 7

7. a) Discuss the design of Firewall. What is its use? 7


b) Discuss various spoofing and foot printing tools. 7

8. Write short notes: 14


i) Steganography
ii) UDP Flood
iii) Lan Scanner Tools

******

CS-703(A)-CBGS PTO

https://www.rgpvonline.com

You might also like