(SEM VII) THEORY EXAMINATION 2022-23 CRYPTOGRAPHY & NETWORK SECURITY

B.Tech Engineering 0 downloads
₹29.00

CRYPTOGRAPHY & NETWORK SECURITY (KCS074)

B.Tech SEM VII – Complete Solved Question Paper (2022–23)
                                                                                                           ⏱ Time: 3 Hours | 📊 Marks: 100

 

SECTION A

Attempt all questions in brief (2 × 10 = 20 marks)

 

(a) Explain Shannon Confusion and Diffusion

Confusion hides the relationship between the key and ciphertext, making it complex.
Diffusion spreads the influence of one plaintext bit over many ciphertext bits, reducing statistical patterns.

 

(b) Apply the Caesar Cipher (p = D(3, C)) and decrypt the ciphertext “PHHW PH”

Caesar cipher with shift 3:                                                             P → M, H → E, H → E, W → T
Decrypted text: MEET ME

 

(c) Calculate Φ(35)

35 = 5 × 7                                                                                     Φ(35) = 35 × (1 − 1/5) × (1 − 1/7)
Φ(35) = 35 × 4/5 × 6/7 = 24

(d) Find gcd(1970, 1066) using Euclid’s algorithm                       1970 = 1066 × 1 + 904
1066 = 904 × 1 + 162                                                                   904 = 162 × 5 + 94
162 = 94 × 1 + 68                                                                         94 = 68 × 1 + 26
68 = 26 × 2 + 16                                                                           26 = 16 × 1 + 10
16 = 10 × 1 + 6                                                                             10 = 6 × 1 + 4
6 = 4 × 1 + 2                                                                                 4 = 2 × 2 + 0

gcd = 2

 

(e) What is Birthday attack?

A birthday attack exploits hash collisions based on probability theory, showing that collisions can occur faster than brute-force due to the birthday paradox.

 

(f) Role of compression function in hash function

The compression function reduces variable-length input into fixed-length output, ensuring diffusion, collision resistance, and security in hash algorithms.

 

(g) What is realm?

A realm is a logical network domain in Kerberos authentication where users and services share a common authentication database.

 

(h) Services provided by PGP

PGP provides:                                                                     Authentication

Confidentiality                                                                   Compression

Email compatibility                                                            Digital signatures

 

(i) Why does ESP include a padding field?

ESP padding ensures proper block alignment, hides plaintext length, and improves security.

 

(j) Mention four SSL protocols                                         SSL Handshake Protocol

SSL Change Cipher Spec                                                  SSL Alert Protocol

SSL Record Protocol

 

SECTION B

Attempt any THREE (10 × 3 = 30 marks)

 

(a) Block cipher vs Stream cipher & modes of operation

Block Cipher: Encrypts data in fixed-size blocks (e.g., AES, DES).
Stream Cipher: Encrypts data bit-by-bit (e.g., RC4).

Modes of operation:
ECB, CBC, CFB, OFB, CTR — used to improve security and handle large data securely.

 

(b) Chinese Remainder Theorem (CRT)

Given:                                                                               X ≡ 2 (mod 3)
X ≡ 3 (mod 5)                                                                   X ≡ 2 (mod 7)

Solution using CRT gives:                                                 X ≡ 23 (mod 105)

 

(c) Why Message Authentication is required? Explain MAC

Message authentication ensures data integrity and authenticity.
MAC (Message Authentication Code) uses a secret key and message to generate a fixed-length tag verified by the receiver.
( Draw MAC block diagram in exam)

 

(d) Digital Certificate & X.509 format

A digital certificate binds a public key with identity.

X.509 fields:                                                                   Version

Serial number                                                                  Issuer

Subject                                                                            Validity period

Public key                                                                        Signature

Revocation: Using CRL or OCSP.

 

(e) Dual signature in SET

Dual signature links payment information and order information while keeping them private.
SET transaction involves customer, merchant, payment gateway, and bank in a secure sequence.

 

SECTION C

Q3 (Attempt any one)

 

(a) Playfair cipher & encryption                                         Key = PLAYFAIR
Message = HIDE THE GOLD IN THE TREESTUMP

After applying Playfair rules:
Ciphertext:                                                                       BM OD ZB XD NA BE KU DM UI XM MO UV IF

 

(b) One round of DES & complementation property

DES round consists of expansion, XOR with key, substitution (S-box), permutation, and XOR with left half.
Property: If plaintext and key are complemented, the ciphertext is also complemented.

 

Q4 (Attempt any one)

(a) AES algorithm & difference with DES

AES uses block size 128 bits and key sizes 128/192/256 bits, while DES uses 56-bit key.
AES is faster, more secure, and resistant to brute-force attacks.

 

(b) Fermat’s theorem & problem

a⁷² ≡ 1 (mod 73)                                                                  9794 mod 73 = 36
So, a = 36

 

Q5 (Attempt any one)

(a) Hash function & SHA-512                                              SHA-512 uses:

1024-bit blocks                                                                    80 rounds

Compression function                                                          Message schedule

( Draw SHA-512 block diagram in exam)

 

(b) Digital Signature & DSA

Digital signature provides authentication, integrity, and non-repudiation.
DSA involves:                                                                         Key generation

Signing                                                                                  Verification

 

Q6 (Attempt any one)

(a) Kerberos services & differences (V4 vs V5)

Kerberos provides authentication using tickets.
Version 5 supports stronger encryption, better scalability, and cross-realm authentication.

 

(b) Diffie-Hellman & MITM attack

Given:                                                                                    p = 71, g = 7
A = 7⁵ mod 71 = 51                                                              B = 7¹² mod 71 = 9

Shared key = 51¹² mod 71 = 9⁵ mod 71 = 49

 

Q7 (Attempt any one)

(a) RSA algorithm & key calculation

p = 13, q = 17                                                                       n = 221, Φ(n) = 192
Public key e = 35                                                                  Private key d = 11

 

(b) Explain:

(i) Intrusion Detection: Monitors malicious activity
(ii) Firewall: Controls network traffic using rules

File Size
110.24 KB
Uploader
SuGanta International
⭐ Elite Educators Network

Meet Our Exceptional Teachers

Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication

KISHAN KUMAR DUBEY

KISHAN KUMAR DUBEY

Sant Ravidas Nagar Bhadohi, Uttar Pradesh , Babusarai Market , 221314
5 Years
Years
₹10000+
Monthly
₹201-300
Per Hour

This is Kishan Kumar Dubey. I have done my schooling from CBSE, graduation from CSJMU, post graduati...

Swethavyas bakka

Swethavyas bakka

Hyderabad, Telangana , 500044
10 Years
Years
₹10000+
Monthly
₹501-600
Per Hour

I have 10+ years of experience in teaching maths physics and chemistry for 10th 11th 12th and interm...

Vijaya Lakshmi

Vijaya Lakshmi

Hyderabad, Telangana , New Nallakunta , 500044
30+ Years
Years
₹9001-10000
Monthly
₹501-600
Per Hour

I am an experienced teacher ,worked with many reputed institutions Mount Carmel Convent , Chandrapu...

Shifna sherin F

Shifna sherin F

Gudalur, Tamilnadu , Gudalur , 643212
5 Years
Years
₹6001-7000
Monthly
₹401-500
Per Hour

Hi, I’m Shifna Sherin! I believe that every student has the potential to excel in Math with the righ...

Divyank Gautam

Divyank Gautam

Pune, Maharashtra , Kothrud , 411052
3 Years
Years
Not Specified
Monthly
Not Specified
Per Hour

An IIT graduate having 8 years of experience teaching Maths. Passionate to understand student proble...

Explore Tutors In Your Location

Discover expert tutors in popular areas across India

Language Classes Near Tilak Nagar – Learn, Speak & Grow with Confidence Tilak Nagar, Delhi
Voice-over Training Near Sushant Lok Phase 2 – Build a Powerful & Professional Voice Career Gurugram
Candle Making Classes In Dwarka Mor – Learn the Art of Handmade Candle Crafting Dwarka Mor, Delhi
Singing / Vocal Training Near DLF Phase 2 Gurugram – Professional Voice Training for Kids, Beginners & Aspiring Singers DLF Phase 2, Gurugram
Harmonium Classes Near Sector 140 Noida – Learn Indian Classical Music with Expert Guidance Sector 140, Noida
Guitar Classes Near Central Noida Sector 10 – Learn Guitar with Expert Trainers A Block Sector 10, Noida
Guitar Classes Near New Friends Colony – Learn Guitar from Expert Trainers in South Delhi New Friends Colony, Delhi
Spoken English Classes Near By Hauz Khas Build Fluency, Confidence & Professional Communication Skills in 2026 Hauz Khas, Delhi
Competitive Exam Coaching Near Dwarka Mor Complete Preparation for Government & Entrance Exams with Expert Guidance Dwarka Mor, Delhi
🇫🇷 French Language Classes Near Sector 114 Noida – Learn French with Professional Trainers Noida
Personal Fitness Training Near Sector 132 Greater Noida – Achieve Your Health and Fitness Goals with Expert Trainers Noida
Guitar Classes Near By Defence Colony Learn Guitar with Expert Trainers & Turn Your Passion into a Lifelong Skill Defence Colony, Delhi
Guitar Classes Near Central Noida Sector 1 – Learn Guitar with Expert Trainers Noida
History Classes Near Sector 91 Gurugram – Build Strong Understanding of the Past for a Better Future Gurugram
Guitar Classes Near By Greater Kailash Learn Guitar with Expert Guidance & Transform Your Passion into a Lifelong Skill Greater Kailash, Delhi
German Language Classes Near Golf Course Road – Learn German for Career & Study Abroad Golf Course Road, Gurugram
Tailoring & Stitching Classes Near Sector 81A Gurugram – Learn Professional Garment Making Skills Sector 81A, Gurugram
Spoken English Classes Near By Chhatarpur Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Chhatarpur, Delhi
Soap Making Classes Near Sector 85 Gurugram – Learn Handmade & Herbal Soap Craft Sector 85, Gurugram
Academic & Tuition Skills Near Sector 87 Gurugram – Build Strong Foundations for Lifelong Success Gurugram
⭐ Premium Institute Network

Discover Elite Educational Institutes

Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies

Réussi Academy of languages

sugandha mishra

Réussi Academy of languages
Madhya pradesh, Indore, G...

Details

Coaching Center
Private
Est. 2021-Present

Sugandha Mishra is the Founder Director of Réussi Academy of Languages, a premie...

IGS Institute

Pranav Shivhare

IGS Institute
Uttar Pradesh, Noida, Sec...

Details

Coaching Center
Private
Est. 2011-2020

Institute For Government Services

Krishna home tutor

Krishna Home tutor

Krishna home tutor
New Delhi, New Delhi, 110...

Details

School
Private
Est. 2001-2010

Krishna home tutor provide tutors for all subjects & classes since 2001

Edustunt Tuition Centre

Lakhwinder Singh

Edustunt Tuition Centre
Punjab, Hoshiarpur, 14453...

Details

Coaching Center
Private
Est. 2021-Present
Great success tuition & tutor

Ginni Sahdev

Great success tuition & tutor
Delhi, Delhi, Raja park,...

Details

Coaching Center
Private
Est. 2011-2020