model 1 c&cs 1
model 1 c&cs 1
Blooms Taxonomy
Course Outcome(s) Question Numbers
Level
CO 1: Understand the fundamentals of networks
security, security architecture, threats and
vulnerabilities 1,2,4,5,8,11(a),11(b),15(a)
RE -Remembering
UN-Understanding
AP-Applying
CO 2: Apply the different cryptographic operations of
3,9,12(a),13(a),13(b),14(a),15(b) AN-Analyzing
symmetric cryptographic algorithms
,16(a),16(b) EV-Evaluating
CR-Creating
CO 5: Understand various Security practices and System
security standards 6,7,10,12(b),14(b)
1. Encrypt the plain text “miss Carlet with the knife in the library” with the key =3201 using row
[UN] 2
Transportation technique.
2. Difference between an unconditionally secure cipher and a computationally secure cipher. [RE] 2
3. Distinguish between attack and threat. [RE] 2
4. Define steganography. [RE] 2
5. In AES, how the encryption key is expanded to produce keys for the 10 rounds? [RE] 2
6. What are the properties hold by a good random number generator? [UN] 2
7. Find GCD (1970,1066)USING Euclid’s algorithm. [UN] 2
8. How to prevent SQL Injection Attacks? [RE] 2
9. What are the classification of Cyber Crimes? [RE] 2
10. Define cybercrime and explain why it poses significant challenges to individuals, organizations and
[UN] 2
society.
PART-B Answer ALL Questions (5x13=65 Marks)
11. (a) (i) Describe OSI security architecture and derive a relativity matrix between security, Attacks, [UN] (8)
Services, and Mechanisms.
(ii) Using play fair cipher algorithm encrypt the plain text = ATTACK POSTPONED using the [AN (5)
key = EMERGENCY ]
OR
11. (b) Perform Encryption and Decryption on the plain text “CAT” using Hill Cipher with the key [UN] (13
K1. )
Reg.No.
12. (a) Show your calculations and the result to encrypt the message “meet me at the usual place
at ten rather than eight o clock” using the Hill cipher with the key (13
[RE]
)
OR
12. (b) (13
Explain about OSI Security architecture model with suitable example. [UN]
)
13 (a) (i) Solve the following using RC4 stream cipher algorithm. Assume the state key vector in 8 [AN] (8)
bits.
Key:[1 0 0 2]
Plaintext: [6 1 5 4]
(ii Illustrate any one pseudo random number generator algorithm. [UN] (5)
)
OR
13 (b) [RE] (13
Explain the overall structure and round structure of DES with neat sketch
)
14 (a) you are given two prime numbers, p=13 and q=17 calculate the following: [UN] (13
Compute n,the modulus for the RSA cryptosystem. )
Calculate Euler’s Totient function of n, which represents the count of
positive integers less than n that are relatively prime to n.
Find the public exponent (e)for the RSA cryptosystem.
15 (a Discuss various security challenges in cloud computing and depict the complete elgamal [UN] (13
) cryptosystem procedure in detail. )
OR
15 (b) Explain various attacks on Kerberos and depict how it could withstand from all such [UN] (13
violations with neat sketch. )
and enforcement.
Prepared by Approved by
(V.G.Sathyasri,AP/CSE) (HoD/CSE)
1) Encrypt the plain text “miss Carlet with the knife in the library” with the key =3201 using
row Transportation technique.
We now read the columns in the order dictated by the key, which is 3, 2, 0, 1:
Final Ciphertext:
Slihitirxrtwtnealarfhysehkntx
Encrypted Text:
slihitirxrtwtnealarfhysehkntx