Exam Details
Subject | information security | |
Paper | ||
Exam / Course | computer science and engineering | |
Department | ||
Organization | Vardhaman College Of Engineering | |
Position | ||
Exam Date | May, 2018 | |
City, State | telangana, hyderabad |
Question Paper
VARDHAMAN COLLEGE OF ENGINEERING
(AUTONOMOUS)
B. Tech VI Semester Regular Examinations, May 2018
(Regulations: VCE-R15)
INFORMATION SECURITY
(Common to Computer Science and Engineering Information Technology)
Date: 14 May, 2018 FN Time: 3 hours Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks
Unit I
1. Account on the following:
i. Different techniques used in steganography
ii. Essential ingredients of symmetric cipher
10M
Analyze the various types of cryptanalytic attacks based on the amount of information
known to the cryptanalyst.
5M
2. Consider an automated teller machine in which users provide a personal
identification number and a card for account access. Give examples of
confidentiality, integrity and availability requirements associated with the system.
6M
Show your calculations and the result to encrypt the message "SHORT EXAMPLE"
using the Hill Cipher with the key
9M
Unit II
3. Show that the inverse of 5 modulo 101 is 599. 7M
Explain AES structure with a neat diagram.
8M
4. What is triple encryption? How many keys are used in triple encryption? 5M
Find the two smallest positive integer solutions to the following system of
equivalences:
i. x ≡ 2 (mod
ii. x ≡ 5 (mod
iii. x ≡ 4 (mod 37)
10M
Unit III
5. Explain Diffie-Hellman key Exchange with an example. 8M
Explain the working of HMAC algorithm with neat diagram.
7M
6. Explain Message Authentication Code for authentication tied to plaintext and
authentication tied to ciphertext with a neat diagram.
8M
In a public-key system using RSA, you intercept the ciphertext C=10 sent to a user
whose public key is n=35. What is the plaintext Write the corresponding
pseudocode.
7M
Unit IV
7. Give examples of applications of IPSec. What services are provided by IPSec? 7M
Discuss briefly about the X.509 certificate format.
8M
8. Why is R64 conversion useful for an e-mail application? Explain in detail. 7M
What four requirements were defined for Kerberos?
8M
Unit V
9.
a)With the help of the timing diagram explain the various messages exchanged between client and server in handshake protocol.
9M
b)What is the difference between an SSL connection and an SSL session?
6M
10.
a)Explain the role of trusted systems in enforcing security.
8M
b)What is the difference between a packet-filtering router and a stateful inspection firewall?
(AUTONOMOUS)
B. Tech VI Semester Regular Examinations, May 2018
(Regulations: VCE-R15)
INFORMATION SECURITY
(Common to Computer Science and Engineering Information Technology)
Date: 14 May, 2018 FN Time: 3 hours Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks
Unit I
1. Account on the following:
i. Different techniques used in steganography
ii. Essential ingredients of symmetric cipher
10M
Analyze the various types of cryptanalytic attacks based on the amount of information
known to the cryptanalyst.
5M
2. Consider an automated teller machine in which users provide a personal
identification number and a card for account access. Give examples of
confidentiality, integrity and availability requirements associated with the system.
6M
Show your calculations and the result to encrypt the message "SHORT EXAMPLE"
using the Hill Cipher with the key
9M
Unit II
3. Show that the inverse of 5 modulo 101 is 599. 7M
Explain AES structure with a neat diagram.
8M
4. What is triple encryption? How many keys are used in triple encryption? 5M
Find the two smallest positive integer solutions to the following system of
equivalences:
i. x ≡ 2 (mod
ii. x ≡ 5 (mod
iii. x ≡ 4 (mod 37)
10M
Unit III
5. Explain Diffie-Hellman key Exchange with an example. 8M
Explain the working of HMAC algorithm with neat diagram.
7M
6. Explain Message Authentication Code for authentication tied to plaintext and
authentication tied to ciphertext with a neat diagram.
8M
In a public-key system using RSA, you intercept the ciphertext C=10 sent to a user
whose public key is n=35. What is the plaintext Write the corresponding
pseudocode.
7M
Unit IV
7. Give examples of applications of IPSec. What services are provided by IPSec? 7M
Discuss briefly about the X.509 certificate format.
8M
8. Why is R64 conversion useful for an e-mail application? Explain in detail. 7M
What four requirements were defined for Kerberos?
8M
Unit V
9.
a)With the help of the timing diagram explain the various messages exchanged between client and server in handshake protocol.
9M
b)What is the difference between an SSL connection and an SSL session?
6M
10.
a)Explain the role of trusted systems in enforcing security.
8M
b)What is the difference between a packet-filtering router and a stateful inspection firewall?
Other Question Papers
Subjects
- advanced algorithms
- advanced algorithms laboratory
- advanced data communications
- advanced data structures
- advanced data structures laboratory audit course – i
- advanced mechanics of solids
- advanced mechanisms
- advanced operating systems
- advanced operating systems laboratory
- artificial intelligence and neural networks
- business analytics
- cloud computing
- cloud computing laboratory
- cmos vlsi design
- computer graphics
- computer organization and architecture
- computer vision and pattern recognition
- constitution of india
- cpld and fpga architectures and applications
- cryptography and computer security
- data warehousing and data mining
- datawarehousing and data mining
- design patterns
- digital image processing
- digital systems design
- disaster management
- distributed computing
- distributed databases
- distributed operating systems
- dsp processors and architectures
- embedded linux
- embedded real time operating systems
- embedded systems
- energy conversion systems
- english for research papers writing
- entrepreneurship development
- finite element methods
- fracture, fatigue and creep deformation
- human computer interaction
- image processing
- industrial safety
- information retrieval systems
- information security
- machine learning
- major project phase-i
- major project phase-ii
- microcontrollers for embedded system design
- mini project with seminar audit course – ii
- mobile computing
- mobile satellite communications
- national service scheme
- number theory and cryptography
- object oriented analysis and design
- operations research
- pedagogy studies
- personality development through life enlightenment skills
- power electronic control of dc drives
- power electronic converters-i
- power semi conductor devices
- principles of machine modeling analysis
- research methodology and intellectual property rights
- sanskrit for technical knowledge
- semantic web and social networks
- software engineering principles
- solar, energy and applications
- stress management by yoga
- system modeling and simulation
- value education
- waste to energy
- web security
- wireless and mobile computing