0% found this document useful (0 votes)
19 views2 pages

27.07.2023 - 2 CSE - Cryptography Data Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

27.07.2023 - 2 CSE - Cryptography Data Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

GITA AUTONOMOUS COLLEGE, BHUBANESWAR

(Affiliated to BPUT Odisha)

2nd Semester M.Tech Regular Examination 2022-23

Registration No. :

Subject : Cryptography Data Security


Branch : Computer Science and Engineering
Time : 3 Hours
Full Marks : 60

Instructions :
Answer question No. 1 (Part I) any ten out of 12 bits, from (Part II) any five out of 7 bits
and any two from (Part III) out of 4 bits.
The figures in the right handside margin indicate marks
Part – I Marks
0 Short Answer Type Questions (Answer any ten out of twelve) (02 x 10) BL C PO &
1 O PSO
a) List out some hash algorithm. 1 3 1
b How many keys are required for two people to communicate via a
cipher?
1 2 1
)
c) Define Steganography. 1 1 1
d
Define Denial of service attack. 1 2 1
)
e) What do you meant by Reply Attack? 1 4 1
f) What is block cipher technique? 1 2 1
g) Define virus. Specify the types of viruses. 2 5 2
h Why the leading two octets of message digest are stored in PGP
Message along with encrypted message digest?
2 4 3
)
i) What is masquerade,and Reply attack? 1 2 1
j) What is IP address spoofing? 1 5 1
k
Mention any one technique of attacking RSA. 1 2 1
)
l) What are browser attacks? 1 3 1

Part – II Marks
0 Focussed – Short answer type Questions (Answer any five out (04 x 05) BL C PO &
2 of seven) O PSO
a) Differentiate symmetric and asymmetric encryption? 2 1 1
b 4 3 2
Compare the Features of SHA-1 and MD5 algorithm.
)
c) Explain about different cryptanalytic attacks. 2 2 2
d 1 3 2
Explain Firewall and its types.
)
e) What are the design parameters of Feistel cipher network? 1 1 2
f) What are the difference between SSL version 3 and TLS? 4 5 3
g) Differentiate internal and external error control. 4 4 2

Part – III Marks


Long Answer type Questions (Answer any two out of four) (10 x 2) BL C PO &
O PSO
0 a) Discuss any four Substitution Technique and list their merits 1 2 2
3 and demerits.
b Convert “MEET ME” using Hill cipher with the key matrix
) Convert the cipher text back to plaintext.
3 1 4

0 a) Discuss any four Substitution Technique and list their merits 1 2 2


4 and demerits.
b Explain the technical details of firewall and describe any three
1 4 2
) types of firewall with neat diagram.

0 a) Write brief note on E-mail Security. 1 5 2


5
b Differenciate between digital signature and traditional
1 4 3
) signature? Explain ElGamal digital signature standard briefly.

0 a) Explain the key generation, encryption, decryption of DES


algorithm in detail.
1 2 2
6
b Describe MD5 algorithm in detail. Compare its performance
1 3 2
) with SHA-1.
NB : BL – Blooms Level 1, 2, 3, CO – Course Outcome, PO – Program Outcome, PSO – Program Specific
Outcome

You might also like