Future Vision BIE Future Vision BIE


ONE STOP FOR ALL STUDY MATERIALS & LAB PROGRAMS


E MENU Whatsapp Share Join Telegram, to get Instant Updates
× NOTE! Click on MENU to Browse between Subjects...

Advertisement

CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

[As per Choice Based Credit System (CBCS) scheme]

(Effective from the academic year 2017 - 2018)

SEMESTER - VI

Subject Code 17CS61

IA Marks 40

Number of Lecture Hours/Week 4

Exam Marks 60



CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

Important Questions - MODULE - 2




Advertisement

These Questions are being framed for helping the students in the "FINAL Exams" Only (Remember for Internals the Question Paper is set by your respective teachers). Questions may be repeated, just to show students how VTU can frame Questions.

- ADMIN





17CS61 - CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

Important Questions - MODULE - 2




Advertisement

1. List and explain RSA operations. (8-Marks) (Dec.2019/Jan.2020)

2. The modulus in a toy implementation of RSA is 143

(i) What is the smallest value of a valid encryption key and the corresponding decryption key?

(ii) For the computed encryption key and plaintext = 127, what is the corresponding ciphertext? (8-Marks) (Dec.2019/Jan.2020)

3. In what way are the properties of the cryptographic hash - the one-way property and collision resistance relevant to the security provided by the MAC? Explain. (8-Marks) (Dec.2019/Jan.2020)

4. Consider the digital signature created using the Signer's private key operation but without the hash function i.e. sign(m) = E A pr(m)


Advertisement

Demonstrate how a forged signature may be created using this definition of a digital signature. (8-Marks) (Dec.2019/Jan.2020)

5. Illustrate the RSA algorithm for encryption and decryption. (8-Marks) (June/July.2019)

6. briefly explain the practical issues of RSA algorithm. (4-Marks) (June/July.2019)

7. List the properties of the cryptographic hash. (4-Marks) (June/July.2019)

8. Discuss the case study: SHA-1. (8-Marks) (June/July.2019)


Advertisement

9. Explain the Man-In-the Middle attack on Diffie-Hellman key exchange, with neat diagram. (8-Marks) (June/July.2019)

10. Explain RSA operation in detail. (6-Marks) (Dec 2018/Jan 2019)

11. Explain Public Key Cryptography Standards (PKCS) (5-Marks) (Dec 2018/Jan 2019)

12. Explain Deffie Helman Key exchange. (5-Marks) (Dec 2018/Jan 2019)

13. If the RSA public key is (31, 3599) what is the corresponding private key. (5-Marks) (Dec 2018/Jan 2019)

14. Explain Basic properties of hash function. (5-Marks) (Dec 2018/Jan 2019)


Advertisement

15. Explain Birthday attack. (6-Marks) (Dec 2018/Jan 2019)

16. In a RSA system, it is given p=3, q=11, L=7 and m=5. Find the cipher text 'C' and also find message 'm' from decryption. (8-Marks) (June/July 2018)

17. Define Hash function. Explain the construction of generic cryptographic Hash. (8-Marks) (June/July 2018)

18. With a neat sketch, explain the process of computing Hash function using SHA-1 algorithm. (8-Marks) (June/July 2018)


Advertisement

19. Explain the working of Diffie-Hellman key exchange protocol. (8-Marks) (June/July 2018)


× Note Do You have any Queries, Doubts? Reach us via Mail Or Follow us on Instagram : futurevisionbie

-ADMIN

ANSWER SCRIP FOR THESE QUESTIONS WILL BE UPLOADED "AS SOON AS POSSIBLE"

Visit: https://hemanthrajhemu.github.io/AnswerScript/

For immediate Notification Join the Telegram Channel





× Note Please Share the website link with Your Friends and known Students...

-ADMIN

× Note Page Number is specified to navigate between Pages...
T = Text book
QB = Question Bank
AS = Amswer Script


-ADMIN

Advertisement