You are on page 1of 7

www.andhracolleges.

com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 1


IV B.Tech I Semester Supplimentary Examinations, February 2008
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F

Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

(a) Derive K1 , the first - round subkey.


(b) Derive L0 , R0
(c) Expand R0 to get E[R0 ]
(d) Calculate A=E[R0 ] ⊕ K1 .
(e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding
S-box substitutions.
(f) Cancatenate the results of (e) to get a 32-bit result,B.
(g) Apply the permutation to get P(B).
(h) Calculate R1=P(B) ⊕ L0

www.andhracolleges.com
(i) write down the cipher text. [16]

2. (a) List the characteristics of advanced block ciphers. [8]


(b) What are the differences between RC5 and RC2? [8]

3. (a) What are two different uses of public - key cryptography related to key Dis-
tribution? [6]
(b) Explain RSA Algorithm? [10]

4. (a) Explain in detail about Euclid’s Algorithm.


(b) Determine gcd(1970,1066). [8+8]

5. (a) What is a difference between little-endian and big-endian format?


(b) What basic arithmetical and logical functions are used in MD5? [6+10]

6. (a) List limitations of SMTP/822 scheme?


(b) What are the MIME specifications? [8+8]

7. (a) What are the basic approaches to building SAs?


Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 1


(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]

8. (a) what information used by a typical packet-filtering router?


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

www.andhracolleges.com ⋆⋆⋆⋆⋆

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 2


IV B.Tech I Semester Supplimentary Examinations, February 2008
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain.
(b) Write short notes on crypto analysis.

2. Demonstrate that Blow Fish decryption is inverse of Blowfish encryption.

3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)[8]
(b) For E11(1,6), consider the point G=(2,7) Compute the multiples of G from
2G through 4G. [8]
[8]
[8]

[16]

4. (a) Explain in detail about Extended Euclid’s Algorithm.


(b) Determine Multiplicative inverse of 550 in GF(1759). [8+8]

5. Explain Secure Hash Algorithm. [16]

6. Explain X.509 Authentication services [16]

7. (a) What are the basic approaches to building SAs?

www.andhracolleges.com
(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]

8. Write notes on

(a) Viruses
(b) Worms
(c) Bacteria. [6+6+4]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 3


IV B.Tech I Semester Supplimentary Examinations, February 2008
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F

Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

(a) Derive K1 , the first - round subkey.


(b) Derive L0 , R0
(c) Expand R0 to get E[R0 ]
(d) Calculate A=E[R0 ] ⊕ K1 .
(e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding
S-box substitutions.
(f) Cancatenate the results of (e) to get a 32-bit result,B.
(g) Apply the permutation to get P(B).
(h) Calculate R1=P(B) ⊕ L0

www.andhracolleges.com
(i) write down the cipher text. [16]

2. (a) List the characteristics of advanced block ciphers. [8]


(b) What are the differences between RC5 and RC2? [8]

3. (a) What is an Elliptic Curve? [6]


(b) Explain the additive rules of Elliptic Curve Cryptography? [10]

4. (a) Explain Miller-Robin test algorithm.


(b) Explain Chinese Remainder Theorem. [8+8]

5. Define digital Signature. Explain its role in network security. [16]

6. (a) What problem was Kerberos designed to address?


(b) What are three threats associated with user authentication over a network or
Internet?
(c) List three approaches to secure user authentication over a network or Internet?
[4+4+8]

7. (a) What are the basic approaches to building SAs?


Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 3


(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]

8. (a) What are the three benefits that can be provided by an intrusion detection
system?
(b) What is the difference between rule-based anomaly detection and rule-based
penetration identification? [8+8]

www.andhracolleges.com ⋆⋆⋆⋆⋆

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 4


IV B.Tech I Semester Supplimentary Examinations, February 2008
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F

Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

(a) Derive K1 , the first - round subkey.


(b) Derive L0 , R0
(c) Expand R0 to get E[R0 ]
(d) Calculate A=E[R0 ] ⊕ K1 .
(e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding
S-box substitutions.
(f) Cancatenate the results of (e) to get a 32-bit result,B.
(g) Apply the permutation to get P(B).
(h) Calculate R1=P(B) ⊕ L0

www.andhracolleges.com
(i) write down the cipher text. [16]

2. (a) List the characteristics of advanced block ciphers. [8]


(b) What are the differences between RC5 and RC2? [8]

3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6]


(b) Consider a diffie-helman scheme with a common prime q=11 and a primitive
rootα=2
i. If user A has public key YA = 9, what is A’s private key XA ?
ii. If user B has public key YB = 3, what is the shared key K? [10]

4. (a) State properties of Modular Arithmetic.


(b) What is difference between modular arithmetic and ordinary arithmetic?
(c) Prove the following :
i. a ≡b mod n implies b ≡ a mod n
ii. a ≡ b mod n and b ≡ c mod n imply a ≡ c mod n. [6+4+6]

5. (a) Is it necessary to recover the secret key in order to attack a MAC algorithm?
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 4


(b) What characteristics are needed in a secure hash function? [8+8]

6. (a) What is R64 conversion?


(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

7. Write note on Encapsulating security payload. [16]

www.andhracolleges.com
8. (a) List and briefly define three classes of intruders.
(b) What are two common techniques used to protect a password file? [8+8]

⋆⋆⋆⋆⋆

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information

You might also like