B.TECH - Semester 8 cryptography and network security Question Paper 2019 (nov)
Practice authentic previous year university questions for better exam preparation.
Sample Questions
- What is Rotor machine?
- Write short note on Steganography.
- Differentiate between public key cryptography and Private Key cryptography.
- Explain the term VPN
- Explain the term replay attack ( $\mathbf{5} \boldsymbol{\times} \mathbf{4} \boldsymbol{=} \mathbf{2 0}$ Marks) Answer any one full questions from each Module.
- (a) Explain IDEA algorithm. ..... 8
- (b) Explain DES algorithm with block diagrams. ..... 12 OR
- (a) Explain AES algorithm with block diagrams. ..... 15
- (b) Differentiate between substitution ciphers and transposition ciphers. ..... 5
- (a) List basic qualifying requirements of a Cryptographic Hash function. ..... 5
- (b) Explain SHA algorithm with block diagrams. ..... 15 OR
- (a) Explain MD5 algorithm with block diagrams. ..... 10
- (b) Explain Digital Signature Algorithm. ..... 10 Module - III
- (a) Explain internet key exchange with respect to IP security. ..... 5
- (b) Explain IP security scenario with neat diagram. ..... 7
- (c) Explain IP sec architecture with block diagram. ..... 8 OR
- (a) Explain various functions of S/MIME. ..... 5
- (b) What are the different cryptographic algorithms used in S/MIME? ..... 5
- (c) Explain PGP message generation and reception with block diagrams. ..... 10 Module - IV
- (a) Write short notes on secure electronic transactions. ..... 5 measures on web in the context of transport level security? ..... 15
- (b) What are the different types of threats, consequences and counter OR
- (a) Draw block diagram of SSL protocol Stack. ..... 4
- (b) Explain each protocol of SSL protocol stack. ..... 16
- Compare transposition and substitution techniques.
- Explain the purpose of S-boxes in the design of DES.
- Explain the key expansion algorithm used in AES algorithm.
- What is the difference between modular arithmetic and ordinary arithmetic?
- Give two applications of public key cryptosystems.
- What is the difference between weak and strong collision resistance?
- What requirements should a digital signature scheme satisfy?
- What are security associations?
- Explain transport mode of IPSec operation.
- What is an application level gateway? ( $\mathbf{1 0} \boldsymbol{\times} \mathbf{4} \boldsymbol{=} \mathbf{4 0}$ Marks) P.T.O. Answer one full question from each Module. Each full question carries 20 marks :
- (a) Discuss the security of AES algorithm.
- (b) Explain linear and differential cryptanalysis.
- Explain IDEA encryption algorithm.
- (a) Explain Diffie-Hellman key exchange algorithm.
- (b) Explain Digital Signature Standards. OR
- (a) Explain RSA algorithm.
- (b) Discuss Secure Hash Algorithm.
- (a) Describe S/MIME protocol used for providing email security.
- (b) What are secure electronic transactions? OR
- (a) Explain SSL protocol.
- (b) What are dual signatures? ( $\mathbf{3} \boldsymbol{\times} \mathbf{2 0} \boldsymbol{=} \mathbf{6 0}$ Marks) 2 H - 3411