Exam Details
Subject | information security | |
Paper | ||
Exam / Course | ||
Department | electronics & information technology | |
Organization | National Institute Of Electronics & Information Technology | |
Position | ||
Exam Date | 2018 | |
City, State | delhi, dwarka |
Question Paper
C8-R4 Page 1 of 2 January, 2018
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Find 8-1 mod 17 using Fermat Little Theorem.
Explain Meet-in-the-middle attack in Data Encryption Standard (DES).
What is Shift Cipher? Explain with an example.
What is a group in modular arithmetic? Briefly discuss the properties of a group.
Discuss the role of Key Distribution Centre.
Discuss the Authentication Encryption process in cryptography with the help of block
diagram.
What is second preimage resistance?
2.
Let p (prime number)=23, g (generator or primitive element)=5, a (Alice private key) and
b private key) =15. Compute the session key between Alice and Bob using
Diffie-Hellman key exchange protocol.
Can we solve 8x ≡7 mod 18 using Chinese remainder theorem? If yes, find the possible
solutions. If no, does any solution exist?
3.
Explain the key scheduling, encryption and decryption processes of Advanced Encryption
Standard algorithm with the help of block diagram.
What are the roles of Digital Signature Schemes? Explain RSA digital signature scheme.
4.
What is Birthday Paradox? How many people are required in a room so that the probability
of at least two of them sharing the same birthday should be greater than ½?
What are the applications of Pseudorandom Number Generators Is Blum-Blum-
Shub a binary PRNG Generator? If yes, explain with an example.
5.
What is a hash function? Discuss the digest size, block size, word size and number of
rounds used in SHA-2 algorithm. Draw the Merkle-Damgard block diagram of SHA-2 also.
Draw the block diagram of Message Authentication Code for the process of
message authentication at source and destination sides. What security properties are
required for making MAC stronger?
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.
C8-R4 Page 2 of 2 January, 2018
6.
List various cryptography primitives. Explain the roles of each primitive in cryptography.
Write short nodes on following modes of operations:
Electronic Codebook
ii) Cipher Block Chaining
iii) Cipher Feedback Mode
iv) Output Feedback
Counter Mode
7.
Define multiple encryptions. Why multiple encryptions are required in DES. Discuss with
example.
Is pseudorandom number generator (PRNG) required in stream cipher? Explain the need
of PRNG using RC4 stream cipher.
What is perfect security? How can an encryption algorithm become perfectly secure?
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Find 8-1 mod 17 using Fermat Little Theorem.
Explain Meet-in-the-middle attack in Data Encryption Standard (DES).
What is Shift Cipher? Explain with an example.
What is a group in modular arithmetic? Briefly discuss the properties of a group.
Discuss the role of Key Distribution Centre.
Discuss the Authentication Encryption process in cryptography with the help of block
diagram.
What is second preimage resistance?
2.
Let p (prime number)=23, g (generator or primitive element)=5, a (Alice private key) and
b private key) =15. Compute the session key between Alice and Bob using
Diffie-Hellman key exchange protocol.
Can we solve 8x ≡7 mod 18 using Chinese remainder theorem? If yes, find the possible
solutions. If no, does any solution exist?
3.
Explain the key scheduling, encryption and decryption processes of Advanced Encryption
Standard algorithm with the help of block diagram.
What are the roles of Digital Signature Schemes? Explain RSA digital signature scheme.
4.
What is Birthday Paradox? How many people are required in a room so that the probability
of at least two of them sharing the same birthday should be greater than ½?
What are the applications of Pseudorandom Number Generators Is Blum-Blum-
Shub a binary PRNG Generator? If yes, explain with an example.
5.
What is a hash function? Discuss the digest size, block size, word size and number of
rounds used in SHA-2 algorithm. Draw the Merkle-Damgard block diagram of SHA-2 also.
Draw the block diagram of Message Authentication Code for the process of
message authentication at source and destination sides. What security properties are
required for making MAC stronger?
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.
C8-R4 Page 2 of 2 January, 2018
6.
List various cryptography primitives. Explain the roles of each primitive in cryptography.
Write short nodes on following modes of operations:
Electronic Codebook
ii) Cipher Block Chaining
iii) Cipher Feedback Mode
iv) Output Feedback
Counter Mode
7.
Define multiple encryptions. Why multiple encryptions are required in DES. Discuss with
example.
Is pseudorandom number generator (PRNG) required in stream cipher? Explain the need
of PRNG using RC4 stream cipher.
What is perfect security? How can an encryption algorithm become perfectly secure?
Other Question Papers
Departments
- electronics & information technology
Subjects
- accounting & financial management system
- advanced algorithms
- advanced computer graphics
- advanced computer networks
- application of .net technology
- applied operations research
- artificial intelligence & neural networks
- automata theory & compiler design
- basic mathematics
- basics of os, unix & shell programming
- basics of os, unix and shell programming
- computer based statistical & numerical methods
- computer graphics & multimedia
- computer system architecture
- cyber forensic & law
- data communication and network technologies
- data communication and network technologies
- data network and management
- data structure through c++
- data structure through java
- data structures through ‘c++’
- data warehouse and data mining
- data warehousing and data mining
- digital image processing
- digital image processing and computer visio
- digital signal processing
- discrete structures
- e-business
- elements of mathematical sciences
- embedded systems
- graphics and visualisation
- image processing and computer vision
- information security
- information storage & management
- internet technology and web design
- internet technology and web design
- internet technology and web services
- introduction to database management system
- introduction to dbms
- introduction to ict resources
- introduction to multimedia
- introduction to object oriented programming through java
- introduction to object-oriented programming through java
- it tools and business system
- it tools and business systems
- machine learning
- management fundamentals & information systems
- mathematical methods for computing
- mobile computing
- multimedia systems
- multimedia systems
- network management & information security
- object oriented database management systems
- operating system
- operating systems
- parallel computing
- professional & business communication
- programming and problem solving through ‘c’ language
- programming and problem solving through ‘c’ language
- project management
- soft computing
- software engineering and case tools
- software project management
- software systems
- software testing and quality management
- software testing and quality management
- structured system analysis & design
- structured system analysis and design
- system modeling & computer simulation
- visual programming
- wireless & mobile communication