0% found this document useful (0 votes)
34 views2 pages

Cryptography Network Security Sep Oct 2022

Uploaded by

hypertaker04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

Cryptography Network Security Sep Oct 2022

Uploaded by

hypertaker04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

i lilt titffi Iilt fifi iilit ilil tfi uG - 422

Vl Semester B.C.A. Examin?fon, SeptemberlOctob er 2A22


(CBCS) (F + R) (2016 - 17 and Onwards)
COMPUTER SCIENCE
BCA 603 : Cryptography and Network Security
Time : 3 Hours Max. Marks: 100

lnstruction : Answer all the Sections.

SECTION - A
Answer any ten questions. Each question carries two marks. (10x2=20)
1. Name any two active attacks.
2. Define monoalphabetic cipher.
3. Define block cipher.
4. Differentiate steganography and water marking.
5. What is Avalanche effect ?
6. What is residue class ?
7. Define trapdoor one-way function.
B. Write any two attacks on RSA.
9. What is Kerberos ?
10. Define S/MIME.
11. Whai is blind signature ?

12. List two protocolJ'which provide security for emails.

SECTION -B
Answer any five questions. Each question carries five marks. (5x5=25)
'
13. Explain various security mechanisms. 5

14. Explain play fair cipher with an example. 5

15. What is cryptographic hash function ? Explain its properties. 5

P.T.O.
uG - 422 Itilil ilfifiilfitifi ililtilil itil

16. Write a note on steganography. 5


17. Compare AES and DES. 5
18. Explain Fermat's little theorem. 5
19. What is PKI ? What are main duties of PKI ? 5
20. Explain the two modes of operation in lPSec. 5

SECTION _ C
Answer any three questions. Each question carries fifteen marks. (3x15=45)
21. a) Explain any three types of cryptoanalytic attacks" I
b) Explain extended Euclidean algorithm with an example. 7
22. aj Explain the four stages of AES algorithm. 8
b) Explain rnultiple DE 7
23. a) Explain any two prc stic algorithms for primality testing. I
b) State and explain Remainder theorem with an example. 7
24. a) Explain Whirlpool Cipher. I
b) Explain X.509 cerlificate. 7
a) Explain the protocols in SSL. I
b) Write a note on lKE. 7

SECTION -D
Answer any one question. Each question carribs ten marks. (1x10=10)
26. Explain RSA cryptosystem. 10
27. Explain security policy inbound and outbound processing. 10

You might also like