GITA AUTONOMOUS COLLEGE, BHUBANESWAR
(Affiliated to BPUT Odisha)
2nd Semester M.Tech Regular Examination 2022-23
Registration No. :
Subject : Cryptography Data Security
Branch : Computer Science and Engineering
Time : 3 Hours
Full Marks : 60
Instructions :
Answer question No. 1 (Part I) any ten out of 12 bits, from (Part II) any five out of 7 bits
and any two from (Part III) out of 4 bits.
The figures in the right handside margin indicate marks
Part – I Marks
0 Short Answer Type Questions (Answer any ten out of twelve) (02 x 10) BL C PO &
1 O PSO
a) List out some hash algorithm. 1 3 1
b How many keys are required for two people to communicate via a
cipher?
1 2 1
)
c) Define Steganography. 1 1 1
d
Define Denial of service attack. 1 2 1
)
e) What do you meant by Reply Attack? 1 4 1
f) What is block cipher technique? 1 2 1
g) Define virus. Specify the types of viruses. 2 5 2
h Why the leading two octets of message digest are stored in PGP
Message along with encrypted message digest?
2 4 3
)
i) What is masquerade,and Reply attack? 1 2 1
j) What is IP address spoofing? 1 5 1
k
Mention any one technique of attacking RSA. 1 2 1
)
l) What are browser attacks? 1 3 1
Part – II Marks
0 Focussed – Short answer type Questions (Answer any five out (04 x 05) BL C PO &
2 of seven) O PSO
a) Differentiate symmetric and asymmetric encryption? 2 1 1
b 4 3 2
Compare the Features of SHA-1 and MD5 algorithm.
)
c) Explain about different cryptanalytic attacks. 2 2 2
d 1 3 2
Explain Firewall and its types.
)
e) What are the design parameters of Feistel cipher network? 1 1 2
f) What are the difference between SSL version 3 and TLS? 4 5 3
g) Differentiate internal and external error control. 4 4 2
Part – III Marks
Long Answer type Questions (Answer any two out of four) (10 x 2) BL C PO &
O PSO
0 a) Discuss any four Substitution Technique and list their merits 1 2 2
3 and demerits.
b Convert “MEET ME” using Hill cipher with the key matrix
) Convert the cipher text back to plaintext.
3 1 4
0 a) Discuss any four Substitution Technique and list their merits 1 2 2
4 and demerits.
b Explain the technical details of firewall and describe any three
1 4 2
) types of firewall with neat diagram.
0 a) Write brief note on E-mail Security. 1 5 2
5
b Differenciate between digital signature and traditional
1 4 3
) signature? Explain ElGamal digital signature standard briefly.
0 a) Explain the key generation, encryption, decryption of DES
algorithm in detail.
1 2 2
6
b Describe MD5 algorithm in detail. Compare its performance
1 3 2
) with SHA-1.
NB : BL – Blooms Level 1, 2, 3, CO – Course Outcome, PO – Program Outcome, PSO – Program Specific
Outcome