0% found this document useful (0 votes)
83 views2 pages

Cryptography & Network Security (18cs2t36) - End Term Exam - 2022-2023

Uploaded by

rname9626
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views2 pages

Cryptography & Network Security (18cs2t36) - End Term Exam - 2022-2023

Uploaded by

rname9626
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Silicon Institute of Technology

Silicon Hills, Bhubaneswar


| An Autonomous Institute |

7th Semester B.Tech. End Term Examination 2022-23


CRYPTOGRAPHY & NETWORK SECURITY(18CS2T36)
Duration: 03:00 Full Marks: 60

1 Answer All
a What do you mean by statistical attack? Give an example.
1
b Differentiate between Block and Stream Cipher.
1
c What is triple DES? What is its advantage over double DES?
1
d Find the inverses of 3 and 4 in Z .
14 1
e Find the value of Φ(242) with necessary steps.
1
f What is elliptic curve discrete logarithm problem (ECDLP)?
1
g How the receiver checks the integriety of a message before accepting it?
1
h What is the message block size and digest size of MD5?
1
i
What do you mean by digital signature? How to achieve it? 1
j What do you mean by a cipher suite? Give an example.
1
2 Answer All
a Explain what is meant by transposition cipher with an example?
3
b Find the multiplicative inverse of 38 in Z
180 using the Extended Euclidean Algorithm. 3
Show the steps.
c Explain the Diffie-Hellman symmetric key exchange with suitable diagram.
3
d How nonrepudiation can be achieved with digital signature? Explain with a diagram.
3
e Explain briefly about the significance of the S/MIME protocol and the encoding used to
3
achieve it.
3 Answer any One
a 9 4 7
Encrypt the message "meet me today" using Hill cipher with the key [ ] . Then
5 7

decrypt the ciphertext to show the plaintext. Show your calculations and result.
b Give the mathematical model of affine cipher. Using this cipher, encrypt the word
7
"encryption" using the key (3,5).
4 Answer any One
a Solve the Bezout's identity s.a+t.b=gcd(a,b) by using Extended Euclidean Algorithm, where
7
a=161 and b= 28. Show all the steps in detail by using a table.
b Draw a block diagram to show the general structure of AES. Explain the operations
7
performed in each round.
[P. T. O.]
5 Answer any One
a Explain the procedure for key generation, encryption and decryption in RSA cryptosystem
7
with an example.
b Using Chinese remainder theorem (CRT), find an integer that has a reminder of 2 when divided by 3,
7

remainder of 3 when divided by 7 and remainder of 2 when divided by 5. Show the deailed steps.

6 Answer any One


a What is message authentication code (MAC)? What are the different methods of attcaks?
7
Distinguish between Nested MAC and HMAC.
b What is the significance of one-way hash function in cryptography? Explain the working of
7
SHA-512 with suitable diagram.
7 Answer any One
a What is the role of a certification authority? Explain the certificate format of X.509 for
7
issuing the certificates.
b Explain the architecture of the PGP protocol to achieve authentication and confidentiality
7
with a suitable diagram.

You might also like