Reg. No.
SNS COLLEGE OF TECHNOLOGY
(An Autonomous Institution, Affiliated to Anna University)
Coimbatore – 641 035.
B.E DEGREE END SEMESTER EXAMINATION, APRIL/MAY 2024
EIGHTH SEMESTER
B TECH - IT
19ITB302 – CRYPTOGRAPHY AND NETWORK SECURITY
(REGULATION 2019)
TIME: THREE HOURS MAXIMUM MARKS: 100
ANSWER ALL QUESTIONS
PART A –– (10 x 2 = 20 Marks)
CO BL M
1. Distinguish Encryption and Decryption. CO1 Ana 2
2. Give Need for Security at Multiple levels. CO1 Und 2
3. Write the Euclidean Algorithm. CO2 Rem 2
4. State the five modes of operation of block cipher? CO2 Und 2
5. What is the role of compression function in hash function? CO3 Rem 2
6. How is the security of a MAC function expressed? CO3 Und 2
7. Recall how digital signatures differ from authentication protocols? CO4 App 2
8. Point out the services provided by PGP? CO4 Und 2
9. Explain the protocols used to provide IP security. CO5 Und 2
10. Does the firewall ensure 100% security to the system? Comment. CO5 Ana 2
PART B –– (5 x 16 = 80 Marks)
Summarize OSI security architecture model with neat
11. (a) (i) CO1 Und 8
diagram.
(ii) Discuss the various security mechanisms. CO1 Und 8
(OR)
(b Describe DES algorithm with neat diagram and explain CO1 Und 16
) the steps.
1
Discuss the Diffie-Hellman key exchange algorithm CO2 App 10
12. (a) (i)
with its merits and demerits.
Explain public key cryptography and when it is CO2 App 6
(ii)
preferred.
(OR)
(b Describe RSA algorithm and perform encryption and CO2 App 16
) decryption using RSA algorithm for the following:
p=7 q=11, e=7, M=9.
How Hash function algorithm is designed? Explain CO3 Und 16
13. (a)
their features and properties.
(OR)
(b What is Digital Signature? Explain how it is created at CO3 Und 16
) the sender end and retrieved at receiver end
differentiate digital signature from digital certificate.
Explain in detail about X.509 authentication services CO4 App 16
14. (a)
and its adoption in realtime internet.
(OR)
(b Evaluate the performance of PGP. Compare it with CO4 App 16
) S/MIME.
Discuss the roles of the different servers in Kerberos CO5 Ana 16
15. (a) protocol. How does the user get authenticated to the
different servers?
(OR)
(b Write the steps involved in the simplified form of the CO5 Ana 16
) SSL / TLS protocol and explain the methodology
involved in computing the keys in SSL / TLS protocol.
***********
CO – Course Outcome, Blooms Taxonomy Abbreviations: Rem - Remembrance,
Und-Understanding, App - Apply, Ana - Analyze, Eva - Evaluate, Cre - Create