Silicon Institute of Technology
Silicon Hills, Bhubaneswar
| An Autonomous Institute |
7th Semester B.Tech. End Term Examination 2022-23
CRYPTOGRAPHY & NETWORK SECURITY(18CS2T36)
Duration: 03:00 Full Marks: 60
1 Answer All
a What do you mean by statistical attack? Give an example.
1
b Differentiate between Block and Stream Cipher.
1
c What is triple DES? What is its advantage over double DES?
1
d Find the inverses of 3 and 4 in Z .
14 1
e Find the value of Φ(242) with necessary steps.
1
f What is elliptic curve discrete logarithm problem (ECDLP)?
1
g How the receiver checks the integriety of a message before accepting it?
1
h What is the message block size and digest size of MD5?
1
i
What do you mean by digital signature? How to achieve it? 1
j What do you mean by a cipher suite? Give an example.
1
2 Answer All
a Explain what is meant by transposition cipher with an example?
3
b Find the multiplicative inverse of 38 in Z
180 using the Extended Euclidean Algorithm. 3
Show the steps.
c Explain the Diffie-Hellman symmetric key exchange with suitable diagram.
3
d How nonrepudiation can be achieved with digital signature? Explain with a diagram.
3
e Explain briefly about the significance of the S/MIME protocol and the encoding used to
3
achieve it.
3 Answer any One
a 9 4 7
Encrypt the message "meet me today" using Hill cipher with the key [ ] . Then
5 7
decrypt the ciphertext to show the plaintext. Show your calculations and result.
b Give the mathematical model of affine cipher. Using this cipher, encrypt the word
7
"encryption" using the key (3,5).
4 Answer any One
a Solve the Bezout's identity s.a+t.b=gcd(a,b) by using Extended Euclidean Algorithm, where
7
a=161 and b= 28. Show all the steps in detail by using a table.
b Draw a block diagram to show the general structure of AES. Explain the operations
7
performed in each round.
[P. T. O.]
5 Answer any One
a Explain the procedure for key generation, encryption and decryption in RSA cryptosystem
7
with an example.
b Using Chinese remainder theorem (CRT), find an integer that has a reminder of 2 when divided by 3,
7
remainder of 3 when divided by 7 and remainder of 2 when divided by 5. Show the deailed steps.
6 Answer any One
a What is message authentication code (MAC)? What are the different methods of attcaks?
7
Distinguish between Nested MAC and HMAC.
b What is the significance of one-way hash function in cryptography? Explain the working of
7
SHA-512 with suitable diagram.
7 Answer any One
a What is the role of a certification authority? Explain the certificate format of X.509 for
7
issuing the certificates.
b Explain the architecture of the PGP protocol to achieve authentication and confidentiality
7
with a suitable diagram.