You are on page 1of 1

Roll No.

Paper Code: TIT 704



Mid Semester Examination, 2014
B.TECH 7
TH
SEMESTER
Paper Name : MODERN CRYPTOGRAPHY
Time: Two Hours MM: 60

Note:
(i) This question paper contains two Sections Section A and Section B.
(ii) Answer all questions in Section A - by choosing correct option from multiple choices. Each question
carries two marks.
(iii) Answer any four questions from Section B. Each question carries twelve marks.

Section A
1. Attempt all multiple choice questions choosing correct option. (6 x 2 = 12 Marks)
(i) Ciphertext is:
(a) A system of encryption and decryption
(b) The encrypted form
(c) Hidden writing
(d) None of the above
(ii) In Substitution ciphers
(a) The order of plaintext letters is rearranged during encryption
(b) Letters of plaintext message are replaced with other letters during encryption
(c) Both A and B
(d) None of the above
(iii) Masquerade in communication systems means :
(a) This attack has a specific target
(b) Takes place when one entity pretends to be a different entity
(c) Takes place when the messages are delayed
(d) None of the above
(iv) Data Encryption Standard (DES) is an example of
(a) Block cipher
(b) Stream cipher
(c) Bit cipher
(d) None of the above
(v) In symmetric cryptography, which of the following MUST be true:
(a) Encryption and decryption take the same amount of time
(b) Different algorithms are used for encryption and decryption
(c) Cryptographic operations are one way, and not reversible
(d) The same key is used for encryption and decryption
(vi) The DES uses ___________ for encryption
(a) Confusion
(b) Diffusion
(c) Both A and B
(d) None of the above

Section B
*Attempt any four of the following questions: (4 x 12 = 48 Marks)
2. (a) Describe the DES round function in detail giving detailed diagrams.
(b) Give the salient features of Fiestal-cipher structure design.
3. (a) Define cryptanalysis. What are the various kinds of cryptanalytic attacks.
(b) Explain active and passive attacks with examples.
4. (a) Differentiate between symmetric and asymmetric encryption.
(b) Convert the message MEET ME using Playfair cipher with key MATRIX.
5. (a) Define diffusion and confusion. Describe how DES implements these.
(b) Compare block cipher with stream cipher giving examples.
6. (a) Define the various security mechanisms and the security goals they help to implement.
(b) What are computationally secure algorithms. Why is One time pad called a perfect cipher.
7. (a) Explain the working of Hill cipher giving an example.
(b) What is steganography. How is it different from encryption algorithms.

You might also like