Subjects
Applied Mathematics for Electrical Engineering - 3130908
Complex Variables and Partial Differential Equations - 3130005
Engineering Graphics and Design - 3110013
Basic Electronics - 3110016
Mathematics-II - 3110015
Basic Civil Engineering - 3110004
Physics Group - II - 3110018
Basic Electrical Engineering - 3110005
Basic Mechanical Engineering - 3110006
Programming for Problem Solving - 3110003
Physics Group - I - 3110011
Mathematics-I - 3110014
English - 3110002
Environmental Science - 3110007
Software Engineering - 2160701
Data Structure - 2130702
Database Management Systems - 2130703
Operating System - 2140702
Advanced Java - 2160707
Compiler Design - 2170701
Data Mining And Business Intelligence - 2170715
Information And Network Security - 2170709
Mobile Computing And Wireless Communication - 2170710
Theory Of Computation - 2160704
Semester
Semester - 1
Semester - 2
Semester - 3
Semester - 4
Semester - 5
Semester - 6
Semester - 7
Semester - 8
Information And Network Security
(2170709)
INS-2170709
Winter-2018
BE | Semester
7
Winter - 2018
|
19/11/2019
Total Marks
70
Q1
(a)
Differentiate block cipher and a stream cipher.
3 Marks
Q1
(b)
Encrypt the Message “Surgical Strike” with key “GUJAR” using PLAYFAIR technique.
4 Marks
Q1
(c)
Discuss in detail encryption and decryption process of DES.
7 Marks
Q2
(a)
Distinguish between Symmetric encryption and Asymmetric encryption using suitable example
3 Marks
Q2
(b)
Describe the term: Authentication, Authorization, Integrity and Non – repudiation
4 Marks
Q2
(c)
Discuss in detail encryption and decryption process of AES.
7 Marks
OR
Q2
(c)
Encrypt the message "meet me at the usual place " using the Hill cipher with the key
9
4
5
7
7 Marks
Q3
(a)
Explain Avalanche Effect
3 Marks
Q3
(b)
Discuss Man in Middle Attack.
4 Marks
Q3
(c)
Explain in detail RSA algorithm, highlighting its security aspect.
7 Marks
OR
Q3
(a)
Explain the VERNAM Cypher method
3 Marks
Q3
(b)
Explain the difference between diffusion and confusion
4 Marks
Q3
(c)
Briefly explain Diffie Hellman Key exchange with an example.
7 Marks
Q4
(a)
What is MAC ? How it useful in Crypto System.
3 Marks
Q4
(b)
Briefly explain Digital Signature algorithm
4 Marks
Q4
(c)
Described briefly the Authentication process covered by X.509
7 Marks
OR
Q4
(a)
Discuss HASH function and its application in Crypto System
3 Marks
Q4
(b)
Explain Different type of Attacks on Crypto System
4 Marks
Q4
(c)
Explain PGP with its Authentication and Confidentiality Operation
7 Marks
Q5
(a)
List out the various web security threats.
3 Marks
Q5
(b)
What is meant by message digest? Give an example
4 Marks
Q5
(c)
Discuss clearly Secure Hash Algorithm with its real time application.
7 Marks
OR
Q5
(a)
Explain HAND SHAKE protocol in SSL.
3 Marks
Q5
(c)
Explain digital signature schemes Elgamal and Schnorr.
7 Marks
Q5
(b)
What is KDC? List the duties of a KDC.
4 Marks