0% found this document useful (0 votes)
14 views

model 1 c&cs 1

C & cs question paper

Uploaded by

Suna Bana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

model 1 c&cs 1

C & cs question paper

Uploaded by

Suna Bana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Reg.No.

PGP COLLEGE OF ENGINEERING AND TECHNOLOGY, NAMAKKAL


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MODEL TEST- I
CB3491-CRYPTOGRAPHY AND CYBER SECURITY
Academic Year: 2024-2025(ODD Semester)

Year/Semester & Branch: III Year/IV Semester &CSE


Faculty Name: V. G.Sathyasri Date:
Max. Marks: 100 Time: 180 mins

Blooms Taxonomy
Course Outcome(s) Question Numbers
Level
CO 1: Understand the fundamentals of networks
security, security architecture, threats and
vulnerabilities 1,2,4,5,8,11(a),11(b),15(a)
RE -Remembering
UN-Understanding
AP-Applying
CO 2: Apply the different cryptographic operations of
3,9,12(a),13(a),13(b),14(a),15(b) AN-Analyzing
symmetric cryptographic algorithms
,16(a),16(b) EV-Evaluating
CR-Creating
CO 5: Understand various Security practices and System
security standards 6,7,10,12(b),14(b)

PART-A Answer ALL Questions (10x2=20 Marks)

1. Encrypt the plain text “miss Carlet with the knife in the library” with the key =3201 using row
[UN] 2
Transportation technique.
2. Difference between an unconditionally secure cipher and a computationally secure cipher. [RE] 2
3. Distinguish between attack and threat. [RE] 2
4. Define steganography. [RE] 2
5. In AES, how the encryption key is expanded to produce keys for the 10 rounds? [RE] 2
6. What are the properties hold by a good random number generator? [UN] 2
7. Find GCD (1970,1066)USING Euclid’s algorithm. [UN] 2
8. How to prevent SQL Injection Attacks? [RE] 2
9. What are the classification of Cyber Crimes? [RE] 2
10. Define cybercrime and explain why it poses significant challenges to individuals, organizations and
[UN] 2
society.
PART-B Answer ALL Questions (5x13=65 Marks)

11. (a) (i) Describe OSI security architecture and derive a relativity matrix between security, Attacks, [UN] (8)
Services, and Mechanisms.
(ii) Using play fair cipher algorithm encrypt the plain text = ATTACK POSTPONED using the [AN (5)
key = EMERGENCY ]
OR
11. (b) Perform Encryption and Decryption on the plain text “CAT” using Hill Cipher with the key [UN] (13
K1. )
Reg.No.

12. (a) Show your calculations and the result to encrypt the message “meet me at the usual place
at ten rather than eight o clock” using the Hill cipher with the key (13
[RE]
)

OR
12. (b) (13
Explain about OSI Security architecture model with suitable example. [UN]
)

13 (a) (i) Solve the following using RC4 stream cipher algorithm. Assume the state key vector in 8 [AN] (8)
bits.
Key:[1 0 0 2]
Plaintext: [6 1 5 4]
(ii Illustrate any one pseudo random number generator algorithm. [UN] (5)
)
OR
13 (b) [RE] (13
Explain the overall structure and round structure of DES with neat sketch
)

14 (a) you are given two prime numbers, p=13 and q=17 calculate the following: [UN] (13
 Compute n,the modulus for the RSA cryptosystem. )
 Calculate Euler’s Totient function of n, which represents the count of
positive integers less than n that are relatively prime to n.
 Find the public exponent (e)for the RSA cryptosystem.

 Calculate the positive exponent(d) for RSA cryptosystem.


OR
14 (b) (i) [UN] (8)
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2.
 If user A has public key YA=9 What is A’s private key XA?
 If user B has public key YB=3what is the secret key k shared with A?
(ii) [AN (5)
How man in middle attack can be performed in Diffie Hellman algorithm
]

15 (a Discuss various security challenges in cloud computing and depict the complete elgamal [UN] (13
) cryptosystem procedure in detail. )
OR
15 (b) Explain various attacks on Kerberos and depict how it could withstand from all such [UN] (13
violations with neat sketch. )

PART-C Answer the Questions (1x15=15 Marks)


(Application/Design/Analysis/Evaluation/Creativity/Case Study)

You work as an information technology administrator for a multinational firm. Described


16 (a) how you would utilize Kerberos to improve network security and simplify user [AN] (15)
authentication and authorization. What components and processes would you need to put in
place to do this?
OR
16 (b) Your company is implementation Network Access control (NAC) to improve network security. [UN] (15)
outline the implementation process, including policy development, authentication techniques,
Reg.No.

and enforcement.

Prepared by Approved by

(V.G.Sathyasri,AP/CSE) (HoD/CSE)
1) Encrypt the plain text “miss Carlet with the knife in the library” with the key =3201 using
row Transportation technique.

Plain Text (without spaces):


MissCarletwiththeknifeinthelibrary
Now, we arrange this into a grid with 4 columns:
3 2 0 1
-------------
m i s s
C a r l
e t w i
t h t h
e k n i
f e n t
h e l i
b r a r
y x x x

Step 2: Read the columns in the order of the key (3, 2, 0, 1)

We now read the columns in the order dictated by the key, which is 3, 2, 0, 1:

 Column 3 (4th column): s, l, i, h, i, t, i, r, x


 Column 2 (3rd column): r, t, w, t, n, e, l, a
 Column 0 (1st column): m, C, e, t, f, h, b, y
 Column 1 (2nd column): s, a, e, h, k, n, r, x

Final Ciphertext:

Reading these columns in order:

Slihitirxrtwtnealarfhysehkntx
Encrypted Text:
slihitirxrtwtnealarfhysehkntx

You might also like