0% found this document useful (0 votes)
68 views2 pages

CNS Mid Sem 2023

The document is a mid-semester examination for a Cryptography and Network Security course. It contains 5 questions testing students' understanding of cryptographic concepts and algorithms at different cognitive levels. The questions cover topics like cipher techniques, cryptanalysis, modular arithmetic, and Feistel ciphers. Students are asked to analyze, apply and evaluate their knowledge of cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

CNS Mid Sem 2023

The document is a mid-semester examination for a Cryptography and Network Security course. It contains 5 questions testing students' understanding of cryptographic concepts and algorithms at different cognitive levels. The questions cover topics like cipher techniques, cryptanalysis, modular arithmetic, and Feistel ciphers. Students are asked to analyze, apply and evaluate their knowledge of cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

University

(|TER), Siksha 0'Anusandhan Deemedtobe


Facultv of Engineering and Technology
MID-SEMESTER EXAMINATION, April-2023
3035)
Cryptography & Network Security (CSE
Semester:6th
Programme: B.Tech/BCA Time: 2 Hours
Full Marks: 30
Marks
*Taxonomy Ques.
Subject/Course Learning Level Nos.
Outcome
Able to understand the L1 1(c)
L2 1(a)(b),2(a)
security requirement, diferent
and
type of security threat
attack and the principles of
security design. 2(b),4(c) 18
to understand and L1
Able L2 S(a)
implement the most common L3 2{c),3(a)(b),4(b)
of cryptographic 4(a), S(b)
type LA
algorithm. 3(c),5(c) 4
L3
Able to apply modern algebra
and number theory for
understanding of
cryptographic algorithms and
vulnerabilities

Remembering (LI), Understanding (L2),


levels:
*Bloom's taxonomy
Evaluation (L5), Creation (L6)
Application (L3), Analysis (A),
question carries equal mark.
Answer all questions. Each
triad related to computer
2
the significance of ClA
1. (a) Briefly explain
security. context of cryptographic 2
What is meant by "active attack in the
(b) types of active attacks.
system. Also name ditferent 2
the two terms cryptography and cryptanalysis.
(c Diferentiate
2
the "chosen plaintext" type attack.
2. ( Explain briely
difference between substitution and transposition type 2
fbt State the examples.
encryption techniques with

page 1 of 4
e Formulate çaeser cipher for the cipher Text: HHWPHDIWHU 2
WKH WRJD SDUWB to jdentify the plain text with the default
key K=3.
3. (a) What will be the plain text if the cipher text is given by 2
"SOAUNIVERSITY" using playfair cipher with keyword as
"SECRET" (assuming jis combined with i)? Use X' as fller.
(b) Determine the corresponding ciphertext for the plaintext 2

("hill" using the key matrix


k=

2 2
Determine the inverse mod 26 of the matrix.
2
4. (a) Consider the Ciphertext «ICUEEPSWSMNLDHLIAEOE". Using
the Rail Fence Cipher,find out the plaintext for key value 2.
2
{D Using the VIGENERE cipher, encrypt the word "encryption"
using the keyword leg":
2
State the advantages ar1d disadvantages of Steganography".

Briefly explain the design parameters to realize a Feistel cipher


2
5) (a)
structure.

table as gven 2
(b) Givena 8-bit input (35)H to a permutation
permutation
Find the 8-bit output after (in
below.
hexadecimal).
5 173

6 2 8| 4

2
(c) Using Eucidean algorithm find the GCD for the followings:
(i) (2740, 1760)
(i) (4655, 12075);
*End of Questions*

Page 2 of 4

You might also like