CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2017 - 2018)
SEMESTER - VI
Subject Code 17CS61
IA Marks 40
Number of Lecture Hours/Week 4
Exam Marks 60
CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
Important Questions - MODULE - 2
These Questions are being framed for helping the students in the "FINAL Exams" Only (Remember for Internals the Question Paper is set by your respective teachers). Questions may be repeated, just to show students how VTU can frame Questions.
- ADMIN
17CS61 - CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW
Important Questions - MODULE - 2
1. List and explain RSA operations. (8-Marks) (Dec.2019/Jan.2020)
2. The modulus in a toy implementation of RSA is 143
(i) What is the smallest value of a valid encryption key and the corresponding decryption key?
(ii) For the computed encryption key and plaintext = 127, what is the corresponding ciphertext? (8-Marks) (Dec.2019/Jan.2020)
3. In what way are the properties of the cryptographic hash - the one-way property and collision resistance relevant to the security provided by the MAC? Explain. (8-Marks) (Dec.2019/Jan.2020)
4. Consider the digital signature created using the Signer's private key operation but without the hash function i.e. sign(m) = E A pr(m)
Demonstrate how a forged signature may be created using this definition of a digital signature. (8-Marks) (Dec.2019/Jan.2020)
5. Illustrate the RSA algorithm for encryption and decryption. (8-Marks) (June/July.2019)
6. briefly explain the practical issues of RSA algorithm. (4-Marks) (June/July.2019)
7. List the properties of the cryptographic hash. (4-Marks) (June/July.2019)
8. Discuss the case study: SHA-1. (8-Marks) (June/July.2019)
9. Explain the Man-In-the Middle attack on Diffie-Hellman key exchange, with neat diagram. (8-Marks) (June/July.2019)
10. Explain RSA operation in detail. (6-Marks) (Dec 2018/Jan 2019)
11. Explain Public Key Cryptography Standards (PKCS) (5-Marks) (Dec 2018/Jan 2019)
12. Explain Deffie Helman Key exchange. (5-Marks) (Dec 2018/Jan 2019)
13. If the RSA public key is (31, 3599) what is the corresponding private key. (5-Marks) (Dec 2018/Jan 2019)
14. Explain Basic properties of hash function. (5-Marks) (Dec 2018/Jan 2019)
15. Explain Birthday attack. (6-Marks) (Dec 2018/Jan 2019)
16. In a RSA system, it is given p=3, q=11, L=7 and m=5. Find the cipher text 'C' and also find message 'm' from decryption. (8-Marks) (June/July 2018)
17. Define Hash function. Explain the construction of generic cryptographic Hash. (8-Marks) (June/July 2018)
18. With a neat sketch, explain the process of computing Hash function using SHA-1 algorithm. (8-Marks) (June/July 2018)
19. Explain the working of Diffie-Hellman key exchange protocol. (8-Marks) (June/July 2018)
-ADMIN
ANSWER SCRIP FOR THESE QUESTIONS WILL BE UPLOADED "AS SOON AS POSSIBLE"
Visit: https://hemanthrajhemu.github.io/AnswerScript/
For immediate Notification Join the Telegram Channel
-ADMIN
T = Text book
QB = Question Bank
AS = Amswer Script
-ADMIN