Академический Документы
Профессиональный Документы
Культура Документы
Department of IT
IT2352 CRYPTOGRAPHY AND NETWORK SECURITY
UNIT I
PART A
2014 May
2014 Nov
2013 May
2013 Nov
2012 May
2012 Nov
2011 May
2011 Nov
1
2
1
What are active and passive attacks that compromise information Secuirty?
Why random numbers are used in network security?
Decipher the following cipher text using brute force attack:
2
1
2
1
2
1
2
1
technique.
Define steganography.
Give an example each for substitution and transposition ciphers.
Why modular arithmetic has been used in Cryptography?
Define LFSR sequence.
Define finite filed
What is the difference between a mono alphabetic and a poly alphabetic
2
1
2
1
2
cipher?
What is an avalanche effect?
Differentiate passive attack from active attack with example.
What is the use of Fermats theorem?
Give the types of attack.
List out the problems of one time pad?
PART-B
2014 May
1
2
2014 Nov
Explain any two classical ciphers and also describe their security limitations.
Describe Linear Feedback Shift Registers Sequence and Finite Fields with
their application in cryptography.
Encrypt the message PAY using Hill cipher with the following key matrix
and show the decryption to get the original plain text.
17 7 5
K= 21 18 21
2 2 19
2
2013 May
2013 Nov
2
1
2
2012 May
2012 Nov
2011 May
2011 Nov
1
2
1
2
1
2
1
2
What are active and passive attacks that compromise information Secuirty?
(2014 May,2011 May)
PART-B
1.
2.
3.
Explain any two classical ciphers and also describe their security limitations (2014 May
(1),2014 Nov (1),2013 May(1),2012 May (2),2012 Nov (2),2011 May (1),2011 Nov
(1,2))
Write about Fermat and Eulers theorem in detail. (2014 Nov (2), 2013 May (2), 2013
Nov (2), 2012 Nov (1)).
Explain about Chinese remainder theorem (2014 Nov (2),2013 Nov (1),2011 May (2)