Sunteți pe pagina 1din 2

Student

Exam
No.
GANPAT
UNIVERSITY
B. TechSEMESTERvI CoMPUTERENGI NEERI NG/ I NFoRMATI oNTEcHNoLoGY
REGULAR EXAMINATION
MAY/' UNE
-
2012
CElIT 6O3: INFORMATION
SYSTEM
SECURITY
[Total
Marks: 70
Ti me: 3 Hours]
Instructions:
1. Fi gures t o t he ri ght i ndi cat e f ul l marks
2. Each section should be written in a separate answer book
3. Be
preci se
and t o t he
poi nt i n
your answer
SECTI ON-I
Q. 1
(A) Fi nd GcD
(1970, 1065)
(B) Solve the following equation
3x+5y+72=3mod16
x+4v+732=3mod16
2x+7y+32=3mod16
(C) f i nd out mul t i pl i cat i ve
i nverse 20 & 50 i n GF
(101) usi ng
ext ended Eucl i dean met hod.
OR
Q. 1
(A) Discuss RSA cryptosystem with example'
(e)
Using Fermat' s theorem, find out 22' mod 21L
(C) Elaborate the Fermat
primality test for n
=
561
(D) Fi nd out
QR
and
QN
R f or Z7x
Usi ng Chi nese Remi nder Theorem,
sol ve
f ol t owi ng set of
congruence
i ) x=5mod13
i i ) x=3mod5
i i i ) x
=
6 mod 11
wnii is Primitive
root? Find out Primitive roots of
< ZtJ*
'
*)
i n ni n
gi u""
P=41
and
9=43,
Publ i c key e= 11' Encrypt t he
messag6 M
=
100. AI so f i nd out
pri vat e key d'
Q. 2
iAl
Under Knapsack cryptosystem,
Given super increasing t4l
sequence
i t z t l =i i q l i 7 3t 6>, M
=
737 and w
=
635'
Encrypt number 50 and also decrypt the cipher'
(Convert the
number i n bi narY f orm
).
(B) Explain slgnificance oi totient
function in Euler' s theorem
with
t4l
sui t abl e examPl e.
(C) Write brief short note on
i) Broadcast attack
ii) Coppersmith
Theorem
attack
OR
t 3l
I4I
l+j
t 41
t 3l
t 2I
I 2l
t4l
I 4l
Q. 2
(A)
(B)
(c)
t41
I4l
Page I of 2
Given p =
47, q =
ll Under
Rabin cryptosystem,
encrypr
message
M
=
19 t o f i nd
ci pher t ext , al so f i nd' equal l y probabl e
:oul
r.ooT by decrypting
cipher
text and obtain plain
text.
trxpratn
chosen
cipher text attack on RSA with example.
Expl ai n
Rel at ed
Message at t ack i n bri ef .
SECTION-II
Q. 4
(A)
Expl ai n
Di f f i e Hel l man
key exchange
al gori t hm
and
mathemtically
proves
correctness
of aigorithm.
(b)
: 1l l u1, PJ"y
Fai r
ci pher and decrypt t hel oi l owi ng
crpner t ext .
(use J
/
I as combi ne
l et t er)
CipheT text:
QMAKAGMTWTI/VTIH MNMEBH DNTS
Keyword:
MASTER
OF TECHNOLOGY
Q. 3
(A)
Q. 5
OR
(4]
Di scuss
about Message
Di gest wi t h exampl e.
(B)
Discuss
about following
Terms
. 1.
Crypt ography
2. St eganography
(L/ wnre a short not e on
pharmi no.
Q. 6
(A)
Compare
Doubl e DES and Tri pl e DES.
Q. 4
OR
(A)
Explain about
Network
Address Translation (NAT)
in brief. If Two
t6l
users wi t h one I p want s t o communi cat e
wi t h si ngt e remot e host
t hen how NAT perf orm
such communi cat i on.
(t r. )
r. . )rscuss
about f ol l owi ng
al gori t hm
modes wi t h di agram.
16l
1. Electronic
Code Block (ECB)
2. Ci pher Bt ock
Chai ni ng (CBi )
Q. s
(A)
Discuss
about
Messaqe Authentication
Code (MAC)
in brief.
t4j
(B)
Expl ai n DES wi t h mai or st eps wi t h di agram.
'
t 4l
(C)
Alice and Bob want to establish u ,".rJt tey using the Diffie
t3l
Hel l man
key exchange_ prot ocol .
Assumi ng t he vJl ues as n
=
37,
9=5, x=14, y=t 34,
Fi nd out t he val ues
of A, B and t he secret key Kl and K2.
I sl
(B)
(c)
t sl
t 2l
t 61
I 6l
t4J
I4l
t 3l
( B)
Di scuss Vi genere
cl assi cal
ci pher al gori t hm wi t h exampre,
:lllp,t
tl" fotlowing
message
using Variabte
Caesar cipner
ar gont hm.
Message: good
morni ng
Key
=
4 + posi t i on
of charact er
I4l
I4l
I4l
-.-
END OF PAPER
---
Page 2 ot 2

S-ar putea să vă placă și