Future Vision BIE Future Vision BIE


ONE STOP FOR ALL STUDY MATERIALS & LAB PROGRAMS


E MENU Whatsapp Share Join Telegram, to get Instant Updates
× NOTE! Click on MENU to Browse between Subjects...

Advertisement

CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

[As per Choice Based Credit System (CBCS) scheme]

(Effective from the academic year 2017 - 2018)

SEMESTER - VI

Subject Code 17CS61

IA Marks 40

Number of Lecture Hours/Week 4

Exam Marks 60



CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

Important Questions - MODULE - 1




Advertisement

These Questions are being framed for helping the students in the "FINAL Exams" Only (Remember for Internals the Question Paper is set by your respective teachers). Questions may be repeated, just to show students how VTU can frame Questions.

- ADMIN





17CS61 - CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

Important Questions - MODULE - 1




Advertisement

1. What do you mean by cyber-attack? List and explain main motives of launching cyber-attacks. (8-Marks) (Dec.2019/Jan.2020)

2. Using Extended Euclidean Algorithm find the inverse of 12 modulo 79. (8-Marks) (Dec.2019/Jan.2020)

3. Design known plain test attack to obtain the key used in the Vigenere cipher. (8-Marks) (Dec.2019/Jan.2020)

4. Consider a Hill cipher m = 3 (block size = 3) with key k shown below:

output

i. What is the cipher text corresponding to the plaintext = (VOW)?

ii. What is the plain text corresponding to the cipher text = (TQX)? (8-Marks) (Dec.2019/Jan.2020)


Advertisement

5. Describe the types of Vulnerabilities to domain of security. (4-Marks) (June/July.2019)

6. List the guiding principles of security. (4-Marks) (June/July.2019)

7. Write the extended Euclidean algorithm, with an example. (8-Marks) (June/July.2019)

8. Calculate the value of x using Chinese remainder theorem by given below data:

N=210, n1 = 5, n2 = 5, n3 = 7, x 1 = 3, x2 = 5, x3 = 2. (5-Marks) (June/July.2019)

9. Explain the Vigenere Cipher and the Hill Cipher techniques with illustration. (6-Marks) (June/July.2019)

10. With neat diagram, explain Fiestel structure. (5-Marks) (June/July.2019)


Advertisement

11. Define cyber security? Explain the motives of cyber-attack. (5-Marks) (DEC 2018/JAN 2019)

12. Use extended Euclidean algorithm to find inverse of 12 modulo 79? (5-Marks) (DEC 2018/JAN 2019)

13. Apply Chinese remainder theorem to find square roots of 3 modulo 143 and list all square roots of -3 modulo 143. (6-Marks) (DEC 2018/JAN 2019)

14. Explain DES construction in detail. (5-Marks) (DEC 2018/JAN 2019)

15. Explain confusion and Diffusion with example. (5-Marks) (DEC 2018/JAN 2019)

16. Explain three sounds SPN Network. (6-Marks) (DEC 2018/JAN 2019)

17. List and explain the various types of vulnerabilities with common cyber-attacks. (8-Marks) (June/July 2018)

18. Encrypt the plaintext "CRYPTOGRAPHY" using hill cipher technique with key matrix. (8-Marks) (June/July 2018)

output

19. Distinguish between:

I. Confusion and diffusion ciphers
II. Block cipher and stream ciphers. (8-Marks) (June/July 2018)


Advertisement

20. with a neat schematic, explain the single round of DES encryption model. (8-Marks) (June/July 2018)


× Note Do You have any Queries, Doubts? Reach us via Mail Or Follow us on Instagram : futurevisionbie

-ADMIN

ANSWER SCRIP FOR THESE QUESTIONS WILL BE UPLOADED "AS SOON AS POSSIBLE"

Visit: https://hemanthrajhemu.github.io/AnswerScript/

For immediate Notification Join the Telegram Channel





× Note Please Share the website link with Your Friends and known Students...

-ADMIN

× Note Page Number is specified to navigate between Pages...
T = Text book
QB = Question Bank
AS = Amswer Script


-ADMIN

Advertisement