(SEM VII) THEORY EXAMINATION 2021-22 CRYPTOGRAPY & NETWORK SECURITY

B.Tech General 0 downloads
₹29.00

CRYPTOGRAPHY & NETWORK SECURITY – KCS-074

B.Tech (Sem VII) – Detailed Answers

 

SECTION A – Descriptive Answers (2 Marks Each)

 

a) Requirements of Encrypted Tunnels

Encrypted tunnels are used to securely transmit data over untrusted networks. The main requirements include confidentiality to prevent data disclosure, authentication to verify communicating parties, integrity to ensure data is not altered during transmission, and key management for secure key exchange. Encrypted tunnels also require resistance to replay attacks and protection against man-in-the-middle attacks.

 

b) Why Compression is Done Before Encryption in PGP

Compression is performed before encryption in PGP to reduce redundancy in plaintext. This improves encryption strength by minimizing patterns that attackers could exploit. Additionally, compression reduces message size, making transmission more efficient.

 

c) Find the Value of ɸ(12)

Euler’s Totient Function ɸ(n) gives the number of integers less than n that are coprime to n.
For 12:
Numbers less than 12 and coprime to 12 are: 1, 5, 7, 11
Therefore, ɸ(12) = 4

 

d) Compute 361 mod 7

361 ÷ 7 = 51 remainder 4
Hence, 361 mod 7 = 4

 

e) Find gcd (1970, 1066)

Using Euclidean Algorithm:                                  1970 = 1066 × 1 + 904
1066 = 904 × 1 + 162                                           904 = 162 × 5 + 94
162 = 94 × 1 + 68                                                 94 = 68 × 1 + 26
68 = 26 × 2 + 16                                                   26 = 16 × 1 + 10
16 = 10 × 1 + 6                                                     10 = 6 × 1 + 4
6 = 4 × 1 + 2                                                         4 = 2 × 2 + 0

gcd = 2

 

f) Transport Layer Security (TLS)

TLS is a cryptographic protocol that provides secure communication over a network. It ensures confidentiality through encryption, integrity through message authentication codes, and authentication using digital certificates. TLS is widely used in HTTPS, email security, and secure file transfers.

 

g) IPSec ESP Format

Encapsulating Security Payload (ESP) provides confidentiality, integrity, and authentication. ESP format includes ESP header (SPI and sequence number), encrypted payload data, padding, pad length, next header, and optional authentication data.

 

h) Requirements of a Good Hash Function

A good hash function must produce fixed-length output, be easy to compute, exhibit pre-image resistance, second pre-image resistance, and strong collision resistance. A small change in input should result in a significantly different hash output.

 

i) Substitution Cipher vs Transposition Cipher

Substitution CipherTransposition Cipher
Replaces symbolsRearranges symbols
Order preservedOrder changed
Example: CaesarExample: Rail Fence

 

j) Cryptanalysis

Cryptanalysis is the study of breaking cryptographic systems without knowing the secret key. It involves techniques to recover plaintext or keys by analyzing ciphertext patterns and algorithm weaknesses.

 

SECTION B – Long Answers (10 Marks Each)

a) RSA Decryption Problem

Given:                                                                        C = 8, e = 13, n = 33

First factorize n:                                                         33 = 3 × 11

ɸ(n) = (3−1)(11−1) = 2 × 10 = 20                             Find d such that:
e × d ≡ 1 mod 20                                                      13 × 17 = 221 ≡ 1 mod 20

So, d = 17                                                                  Now decrypt:
M = Cᵈ mod n                                                            M = 8¹⁷ mod 33 = 2

 

b) Monoalphabetic vs Polyalphabetic Ciphers

Monoalphabetic ciphers use a single substitution mapping throughout encryption, making them vulnerable to frequency analysis. Polyalphabetic ciphers use multiple substitution alphabets, increasing resistance to cryptanalysis.
Examples:
Monoalphabetic – Caesar Cipher                             Polyalphabetic – Vigenère Cipher

 

c) Chinese Remainder Theorem (CRT)

CRT states that a system of congruences has a unique solution modulo the product of pairwise coprime moduli.

Given:                                                                       X ≡ 1 (mod 5)
X ≡ 2 (mod 7)                                                           X ≡ 3 (mod 9)
X ≡ 4 (mod 11)                                                         Using CRT, the solution is:
X ≡ 1579 (mod 3465)

 

d) Encryption and Decryption Using ECC

ECC uses points on elliptic curves over finite fields.

Encryption: Sender maps plaintext to a point and uses receiver’s public key.

Decryption: Receiver uses private key to retrieve plaintext.
ECC provides strong security with smaller key sizes.

 

e) Euler’s Totient Function Proof

Euler’s Totient Function ɸ(n) counts numbers less than n that are coprime to n.
For n = pq, where p and q are primes:
ɸ(pq) = pq − p − q + 1 = (p−1)(q−1)
Hence proved.

 

SECTION C – Very Long Answers (10 Marks Each)

 

3(a) Security-Critical Component of DES

The most security-critical component of DES is the S-Box. S-Boxes provide non-linearity and confusion by mapping 48-bit input to 32-bit output. They protect DES against linear and differential cryptanalysis.

 

3(b) Miller–Rabin Primality Test

Miller-Rabin is a probabilistic primality test.
Steps:                                                                    Express n−1 = 2ʳ × d

Choose random base a                                          Compute aᵈ mod n

Square repeatedly                                                  Testing 61 shows it passes all rounds → 61 is prime

 

4(a) SHA-1 Algorithm

SHA-1 processes message blocks of 512 bits and produces a 160-bit hash. It involves message padding, initialization, compression rounds, and final hash generation using logical functions and modular additions.

 

4(b) Message Authentication Codes (MAC)

MAC ensures data integrity and authentication using a shared secret key. It prevents unauthorized data modification and impersonation. MACs are widely used in secure communication protocols.

 

5(a) SSL Handshake Protocol

SSL handshake establishes a secure session through:

ClientHello                                                   ServerHello

Certificate exchange                                    Key exchange

Finished messages                                       This process authenticates parties and establishes session keys.

 

5(b) RC4 Stream Cipher

RC4 is a symmetric stream cipher that generates a pseudo-random key stream XORed with plaintext. It is fast but vulnerable due to key scheduling weaknesses.

 

6(a) PGP Message Generation

PGP combines symmetric encryption, public-key encryption, hashing, and compression. It ensures confidentiality, integrity, and authentication using hybrid encryption techniques.

 

6(b) AES S-Box Design

AES S-Box is mathematically generated using finite field inversion and affine transformation, making it more secure than DES S-Boxes, which are manually designed.

 

7(a) Digital Signature Algorithm (DSA)

DSA uses modular exponentiation and hashing to generate digital signatures. Reusing the same random value k compromises the private key, leading to complete security failure.

 

7(b) Group and Ring

A group is a set with one binary operation satisfying closure, associativity, identity, and inverse.
A ring has two operations (addition and multiplication).
Lagrange’s theorem proves that the order of a subgroup divides the order of the group.

File Size
144.48 KB
Uploader
SuGanta International
⭐ Elite Educators Network

Meet Our Exceptional Teachers

Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication

KISHAN KUMAR DUBEY

KISHAN KUMAR DUBEY

Sant Ravidas Nagar Bhadohi, Uttar Pradesh , Babusarai Market , 221314
5 Years
Years
₹10000+
Monthly
₹201-300
Per Hour

This is Kishan Kumar Dubey. I have done my schooling from CBSE, graduation from CSJMU, post graduati...

Swethavyas bakka

Swethavyas bakka

Hyderabad, Telangana , 500044
10 Years
Years
₹10000+
Monthly
₹501-600
Per Hour

I have 10+ years of experience in teaching maths physics and chemistry for 10th 11th 12th and interm...

Vijaya Lakshmi

Vijaya Lakshmi

Hyderabad, Telangana , New Nallakunta , 500044
30+ Years
Years
₹9001-10000
Monthly
₹501-600
Per Hour

I am an experienced teacher ,worked with many reputed institutions Mount Carmel Convent , Chandrapu...

Shifna sherin F

Shifna sherin F

Gudalur, Tamilnadu , Gudalur , 643212
5 Years
Years
₹6001-7000
Monthly
₹401-500
Per Hour

Hi, I’m Shifna Sherin! I believe that every student has the potential to excel in Math with the righ...

Divyank Gautam

Divyank Gautam

Pune, Maharashtra , Kothrud , 411052
3 Years
Years
Not Specified
Monthly
Not Specified
Per Hour

An IIT graduate having 8 years of experience teaching Maths. Passionate to understand student proble...

Explore Tutors In Your Location

Discover expert tutors in popular areas across India

UI/UX Designing Course Near Sector 66 Gurugram – Build a Creative & High-Paying Design Career Sector 66, Gurugram
Yoga Classes Near Malviya Nagar Build Strength, Reduce Stress & Transform Your Lifestyle with Professional Yoga Training in 2026 Malviya Nagar, Delhi
Meditation Coaching Near By Nangloi – Find Inner Peace & Mental Clarity Nangloi, Delhi
Drawing & Sketching Classes Near Sector 67 Gurugram – Nurture Creativity & Artistic Skills Sector 67, Gurugram
Video Editing Classes Near Sector 82A Gurugram – Learn Professional Editing Skills Sector 82A, Gurugram
Spoken English Classes Near By Govindpuri Improve Fluency, Build Confidence & Unlock Better Career Opportunities in 2026 Govindpuri, Delhi
Violin Classes Near Sector 144 Noida – Learn Violin with Professional Music Trainers Sector 144, Noida
App Development Classes Near Noida Sector 102 – Complete Guide to Build Your Career in Mobile App Development Noida
Legal Documentation Assistance Near By Dwarka Mor Reliable, Accurate & Professional Legal Drafting Dwarka Mor, Delhi
UI/UX Designing Classes Near By Kirti Nagar – Build a Creative Tech Career Kirti Nagar, Delhi
Guitar Classes Near By Malviya Nagar Learn Guitar with Expert Trainers & Turn Your Passion into Skill in 2026 Malviya Nagar, Delhi
IELTS Coaching Near Noida Sector 107 – Expert Training for High Band Scores Noida
TOEFL Coaching Near Noida Sector 106 – Complete Guide for Students Preparing to Study Abroad Noida
Painting Classes Near Sector 67A Gurugram – Explore Creativity & Master Artistic Expression Sector 67A, Gurugram
Tally / Accounting Software Classes Near By Kirti Nagar – Become a Skilled Accounts Professional Kirti Nagar, Delhi
High Profit Margin Business Opportunities Near Sector 109 Gurugram (Dwarka Expressway) Gurugram
Digital Marketing Classes Near By Kirti Nagar – Build a High-Growth Career in the Digital World Kirti Nagar, Delhi
Spoken English Classes Near By Saket Improve Fluency, Confidence & Career Opportunities with Expert Training in 2026 Saket, Delhi
No Office Rent Business Setup Near By Uttam Nagar Start & Grow Your Business Without Paying High Office Rent in 2026 Uttam Nagar, Delhi
Voice-over Training Near Sushant Lok Phase 2 – Build a Powerful & Professional Voice Career Gurugram
⭐ Premium Institute Network

Discover Elite Educational Institutes

Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies

Réussi Academy of languages

sugandha mishra

Réussi Academy of languages
Madhya pradesh, Indore, G...

Details

Coaching Center
Private
Est. 2021-Present

Sugandha Mishra is the Founder Director of Réussi Academy of Languages, a premie...

IGS Institute

Pranav Shivhare

IGS Institute
Uttar Pradesh, Noida, Sec...

Details

Coaching Center
Private
Est. 2011-2020

Institute For Government Services

Krishna home tutor

Krishna Home tutor

Krishna home tutor
New Delhi, New Delhi, 110...

Details

School
Private
Est. 2001-2010

Krishna home tutor provide tutors for all subjects & classes since 2001

Edustunt Tuition Centre

Lakhwinder Singh

Edustunt Tuition Centre
Punjab, Hoshiarpur, 14453...

Details

Coaching Center
Private
Est. 2021-Present
Great success tuition & tutor

Ginni Sahdev

Great success tuition & tutor
Delhi, Delhi, Raja park,...

Details

Coaching Center
Private
Est. 2011-2020