Exam Details
Subject | information security | |
Paper | ||
Exam / Course | ||
Department | electronics & information technology | |
Organization | National Institute Of Electronics & Information Technology | |
Position | ||
Exam Date | January, 2017 | |
City, State | delhi, dwarka |
Question Paper
«SRLNO»
C8-R4 Page 1 of 2 January, 2017
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Explain the active security attacks.
Find the inverse of given matrix under modulo 29:
16
2 28
Calculate phi(240) using Euler's phi-function.
Calculate 523 mod 33 using fast exponentiation method.
Find the inverse of 30 in the modulus of 1033 using extended Euclidean algorithm.
Explain the round key structure of DES.
Explain Interactive Proofs and Zero-Knowledge Proofs.
2.
List out the properties of ring and field structures using suitable example.
Let G Z12*. Show that the group is cyclic group. Find out the primitive elements in it.
Calculate z x y where x 123 and y 334, assume that system accepts only numbers less
than 100.
3.
Explain AES transformation functions.
What is trap-door one-way function? Explain the Four possible approaches to attack the RSA
algorithm.
4.
What is digital signature? Explain ELGAMAL digital signature scheme.
List out the problem arises while distributing symmetric key and asymmetric key. Explain how
X.509 has standardized the asymmetric key distribution.
5.
Explain the factorization and discrete logarithm problems. Explain how those are used in
cryptography?
What is Kerberos? What are the roles of authentication and ticket granting server in it? List the
Drawbacks and limitations of Kerberos.
What is Man-in-the-middle attack in Diffie-Hellman algorithm? How it can be prevented?
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.
«SRLNO»
C8-R4 Page 2 of 2 January, 2017
6.
How does a birthday attack on a hashing algorithm work?
What is Cipher Block Chaining Mode? Explain the security issues and error propagation
in CBC.
List and explain the requirements for a Cryptographic Hash Function.
7.
What are Pseudorandom number generator (PRNG) and Pseudorandom function
Define two criteria used to validate that a sequence of numbers is random.
Differentiate Differential Cryptanalysis and Linear Cryptanalysis.
Find the result of (x7 ⊗ (x6 +x4 2 in GF(28) with irreducible polynomial
(x8 +x4 3 using polynomial representation only.
C8-R4 Page 1 of 2 January, 2017
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Explain the active security attacks.
Find the inverse of given matrix under modulo 29:
16
2 28
Calculate phi(240) using Euler's phi-function.
Calculate 523 mod 33 using fast exponentiation method.
Find the inverse of 30 in the modulus of 1033 using extended Euclidean algorithm.
Explain the round key structure of DES.
Explain Interactive Proofs and Zero-Knowledge Proofs.
2.
List out the properties of ring and field structures using suitable example.
Let G Z12*. Show that the group is cyclic group. Find out the primitive elements in it.
Calculate z x y where x 123 and y 334, assume that system accepts only numbers less
than 100.
3.
Explain AES transformation functions.
What is trap-door one-way function? Explain the Four possible approaches to attack the RSA
algorithm.
4.
What is digital signature? Explain ELGAMAL digital signature scheme.
List out the problem arises while distributing symmetric key and asymmetric key. Explain how
X.509 has standardized the asymmetric key distribution.
5.
Explain the factorization and discrete logarithm problems. Explain how those are used in
cryptography?
What is Kerberos? What are the roles of authentication and ticket granting server in it? List the
Drawbacks and limitations of Kerberos.
What is Man-in-the-middle attack in Diffie-Hellman algorithm? How it can be prevented?
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.
«SRLNO»
C8-R4 Page 2 of 2 January, 2017
6.
How does a birthday attack on a hashing algorithm work?
What is Cipher Block Chaining Mode? Explain the security issues and error propagation
in CBC.
List and explain the requirements for a Cryptographic Hash Function.
7.
What are Pseudorandom number generator (PRNG) and Pseudorandom function
Define two criteria used to validate that a sequence of numbers is random.
Differentiate Differential Cryptanalysis and Linear Cryptanalysis.
Find the result of (x7 ⊗ (x6 +x4 2 in GF(28) with irreducible polynomial
(x8 +x4 3 using polynomial representation only.
Other Question Papers
Departments
- electronics & information technology
Subjects
- accounting & financial management system
- advanced algorithms
- advanced computer graphics
- advanced computer networks
- application of .net technology
- applied operations research
- artificial intelligence & neural networks
- automata theory & compiler design
- basic mathematics
- basics of os, unix & shell programming
- basics of os, unix and shell programming
- computer based statistical & numerical methods
- computer graphics & multimedia
- computer system architecture
- cyber forensic & law
- data communication and network technologies
- data communication and network technologies
- data network and management
- data structure through c++
- data structure through java
- data structures through ‘c++’
- data warehouse and data mining
- data warehousing and data mining
- digital image processing
- digital image processing and computer visio
- digital signal processing
- discrete structures
- e-business
- elements of mathematical sciences
- embedded systems
- graphics and visualisation
- image processing and computer vision
- information security
- information storage & management
- internet technology and web design
- internet technology and web design
- internet technology and web services
- introduction to database management system
- introduction to dbms
- introduction to ict resources
- introduction to multimedia
- introduction to object oriented programming through java
- introduction to object-oriented programming through java
- it tools and business system
- it tools and business systems
- machine learning
- management fundamentals & information systems
- mathematical methods for computing
- mobile computing
- multimedia systems
- multimedia systems
- network management & information security
- object oriented database management systems
- operating system
- operating systems
- parallel computing
- professional & business communication
- programming and problem solving through ‘c’ language
- programming and problem solving through ‘c’ language
- project management
- soft computing
- software engineering and case tools
- software project management
- software systems
- software testing and quality management
- software testing and quality management
- structured system analysis & design
- structured system analysis and design
- system modeling & computer simulation
- visual programming
- wireless & mobile communication