Exam Details

Subject information security
Paper
Exam / Course
Department electronics & information technology
Organization National Institute Of Electronics & Information Technology
Position
Exam Date July, 2017
City, State delhi, dwarka


Question Paper

C8-R4 Page 1 of 2 July, 2017
C8-R4: INFORMATION SECURITY
«QP_SRLNO»
NOTE:
Time: 3 Hours Total Marks: 100
1.
Differentiate between Symmetric and Asymmetric encryption.
Differentiate cryptanalysis, cryptography and cryptology.
What are weak keys in Data Encryption Standard Give examples of weak keys.
What are the drawbacks of Output Feedback mode Why Cipher Feedback Mode
and Cipher Block Chaining are better than OFB?
Differentiate between Authentication and Authorization with example.
Let u 19500 and v 11143. Use the Euclidean Algorithm to compute w gcd(u, v). Carry out
the computation so that you are able to find R and S such that w Ru Sv.
Compute Euler's Totient function, φ(1716).

2.
Alice uses the RSA Cryptosystem to receive messages from Bob. She chooses q=23
and her public exponent Alice published the product n=pq=299 and e=35. Check whether
e=35 is a valid exponent for the RSA algorithm Compute d the private exponent of Alice. Bob
wants to send to Alice the (encrypted) plaintext P=15. What does he send to Alice? Verify she
can decrypt this message.
What are different versions of Fermat Little Theorem? Discuss various applications of Fermat
Little Theorem with examples.

3.
Explain the key scheduling, encryption and decryption processes of Data Encryption Standard
algorithm with the help of block diagram. What are the consequences of weak and semi
weak keys in DES algorithm?
Explain the Diffie-Hellman key exchange algorithm.

4.
Solve x≡ 2 (mod x≡ 3 (mod x≡ 2 (mod using Chinese Remainder Theorem. Find first
3 possible solutions of x.
Write pseudo-code and draw block diagram of ANSI X9.17 Pseudorandom Number Generator
(PRNG). Name some attacks that are possible in ANSI X9.17 PRNG.

5.
Explain, how Preimage resistance, Second preimage resistance and Collision resistance
properties are used to measure the strength of any hash function. Draw a block diagram for
explaining the working of hash function in any cryptosystem.
Define MAC. What are the security requirements of MAC?
Differentiate between deterministic and probabilistic primarily testing algorithms. List some
algorithm in each category also.

1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.
C8-R4 Page 2 of 2 July, 2017
6.
What is the purpose of Digital Signature Schemes? Name algorithms used in any digital
signature schemes. Draw block diagram and discuss the properties of digital signature
schemes.
What is Fast Exponentiation? Which cryptography algorithm requires fast exponentiation? Write
steps of one fast exponentiation algorithm.

7. Explain the following:
Advanced Encryption Standard
Cryptography Primitives
Modular Arithmetic in Group, Ring and Field.



Other Question Papers

Departments

  • electronics & information technology

Subjects

  • accounting & financial management system
  • advanced algorithms
  • advanced computer graphics
  • advanced computer networks
  • application of .net technology
  • applied operations research
  • artificial intelligence & neural networks
  • automata theory & compiler design
  • basic mathematics
  • basics of os, unix & shell programming
  • basics of os, unix and shell programming
  • computer based statistical & numerical methods
  • computer graphics & multimedia
  • computer system architecture
  • cyber forensic & law
  • data communication and network technologies
  • data communication and network technologies
  • data network and management
  • data structure through c++
  • data structure through java
  • data structures through ‘c++’
  • data warehouse and data mining
  • data warehousing and data mining
  • digital image processing
  • digital image processing and computer visio
  • digital signal processing
  • discrete structures
  • e-business
  • elements of mathematical sciences
  • embedded systems
  • graphics and visualisation
  • image processing and computer vision
  • information security
  • information storage & management
  • internet technology and web design
  • internet technology and web design
  • internet technology and web services
  • introduction to database management system
  • introduction to dbms
  • introduction to ict resources
  • introduction to multimedia
  • introduction to object oriented programming through java
  • introduction to object-oriented programming through java
  • it tools and business system
  • it tools and business systems
  • machine learning
  • management fundamentals & information systems
  • mathematical methods for computing
  • mobile computing
  • multimedia systems
  • multimedia systems
  • network management & information security
  • object oriented database management systems
  • operating system
  • operating systems
  • parallel computing
  • professional & business communication
  • programming and problem solving through ‘c’ language
  • programming and problem solving through ‘c’ language
  • project management
  • soft computing
  • software engineering and case tools
  • software project management
  • software systems
  • software testing and quality management
  • software testing and quality management
  • structured system analysis & design
  • structured system analysis and design
  • system modeling & computer simulation
  • visual programming
  • wireless & mobile communication