Вы находитесь на странице: 1из 2

GOVERNMENT COLLEGE OF ENGINEERING, DHARMAPURI 636 704 GOVERNMENT COLLEGE OF ENGINEERING, DHARMAPURI 636 704

Department of Computer Science and Engineering Department of Computer Science and Engineering
INTERNAL ASSESSMENT TEST - I INTERNAL ASSESSMENT TEST - I
YEAR / SEM : IV / VII DATE/SESSION: 22.08.2017/FN YEAR / SEM : IV / VII DATE/SESSION: 22.08.2017/FN
SUBJECT : CS6701- Cryptography & Network Security TOT. MARK: 50 SUBJECT : CS6701- Cryptography & Network Security TOT. MARK: 50
TIME : 9.20 AM TO 10.50 AM TIME : 9.20 AM TO 10.50 AM
PART A PART A
Answer all the questions 5 x 2 = 10 Answer all the questions 5 x 2 = 10
1. Give the types of attack with example. 1. Give the types of attack with example.
2. State the difference between conventional encryption and public-key 2. State the difference between conventional encryption and public-key
encryption. encryption.
3. Find GCD(21,300) using Euler theorem. 3. Find GCD(21,300) using Euler theorem.
4. Define Discrete Logarithm 4. Define Discrete Logarithm
5. Define Steganography. 5. Define Steganography.

GOVERNMENT COLLEGE OF ENGINEERING, DHARMAPURI 636 704 GOVERNMENT COLLEGE OF ENGINEERING, DHARMAPURI 636 704
Department of Computer Science and Engineering Department of Computer Science and Engineering
INTERNAL ASSESSMENT TEST - I INTERNAL ASSESSMENT TEST - I
YEAR / SEM : IV / VII DATE/SESSION: 22.08.2017/FN YEAR / SEM : IV / VII DATE/SESSION: 22.08.2017/FN
SUBJECT : CS6701- Cryptography & Network Security TOT. MARK: 50 SUBJECT : CS6701- Cryptography & Network Security TOT. MARK: 50
TIME : 9.20 AM TO 10.50 AM TIME : 9.20 AM TO 10.50 AM
PART A PART A
Answer all the questions 5 x 2 = 10 Answer all the questions 5 x 2 = 10
1. Give the types of attack with example. 1. Give the types of attack with example.
2. State the difference between conventional encryption and public-key 2. State the difference between conventional encryption and public-key
encryption. encryption.
3. Find GCD(21,300) using Euler theorem. 3. Find GCD(21,300) using Euler theorem.
4. Define Discrete Logarithm 4. Define Discrete Logarithm
5. Define Steganography. 5. Define Steganography.
6. a) Explain the OSI security architecture (10) 6. a) Explain the OSI security architecture (10)
7. a) Fill in the blanks and specify an example for each. 7. a) Fill in the blanks and specify an example for each.
i) All Groups satisfies the properties____ (1.5) i) All Groups satisfies the properties____ (1.5)
ii) An Abelian group satisfies the properties____ (1.5) ii) An Abelian group satisfies the properties____ (1.5)
iii) A ring satisfies the properties____ (1.5) iii) A ring satisfies the properties____ (1.5)
iv) A field satisfies the properties____ (1.5) iv) A field satisfies the properties____ (1.5)
b) Describe the Round function of DES (4) b) Describe the Round function of DES (4)
8. a) Is 561 Prime? Explain with Miller Rabin method (6) 8. a) Is 561 Prime? Explain with Miller Rabin method (6)
b) Find 3^21 mod 11 using Fermat's rule (4) b) Find 3^21 mod 11 using Fermat's rule (4)
9. a) Apply Chinese Remainder Theorem to solve (6) 9. a) Apply Chinese Remainder Theorem to solve (6)
x1 mod 4 x1 mod 4
x3 mod 5 x3 mod 5
x2 mod 7 x2 mod 7
b) what is meant differential cryptanalysis and Linear cryptanalysis (4) b) what is meant differential cryptanalysis and Linear cryptanalysis (4)
10. a) Compare DES with AES (2) 10. a) Compare DES with AES (2)
b) What is the purpose of S-box in DES (2) b) What is the purpose of S-box in DES (2)
c) Describe the different modes of operations in DES (6) c) Describe the different modes of operations in DES (6)

6. a) Explain the OSI security architecture (10) 6. a) Explain the OSI security architecture (10)
7. a) Fill in the blanks and specify an example for each. 7. a) Fill in the blanks and specify an example for each.
i) All Groups satisfies the properties____ (1.5) i) All Groups satisfies the properties____ (1.5)
ii) An Abelian group satisfies the properties____ (1.5) ii) An Abelian group satisfies the properties____ (1.5)
iii) A ring satisfies the properties____ (1.5) iii) A ring satisfies the properties____ (1.5)
iv) A field satisfies the properties____ (1.5) iv) A field satisfies the properties____ (1.5)
b) Describe the Round function of DES (4) b) Describe the Round function of DES (4)
8. a) Is 561 Prime? Explain with Miller Rabin method (6) 8. a) Is 561 Prime? Explain with Miller Rabin method (6)
b) Find 3^21 mod 11 using Fermat's rule (4) b) Find 3^21 mod 11 using Fermat's rule (4)
9. a) Apply Chinese Remainder Theorem to solve (6) 9. a) Apply Chinese Remainder Theorem to solve (6)
x1 mod 4 x1 mod 4
x3 mod 5 x3 mod 5
x2 mod 7 x2 mod 7
b) what is meant differential cryptanalysis and Linear cryptanalysis (4) b) what is meant differential cryptanalysis and Linear cryptanalysis (4)
10. a) Compare DES with AES (2) 10. a) Compare DES with AES (2)
b) What is the purpose of S-box in DES (2) b) What is the purpose of S-box in DES (2)
c) Describe the different modes of operations in DES (6) c) Describe the different modes of operations in DES (6)

Вам также может понравиться