[go: up one dir, main page]

0% found this document useful (0 votes)
49 views2 pages

C&ns Midi 3sets 22-23-19bq

Download as doc, pdf, or txt
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 2

VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY

NAMBURU (AUTONOMOUS)
YEAR/SEM : IV – B.Tech - I-Sem NAME OF THE EXAM : MID – I
SUBJECT : SUBJECT CODE :
BRANCH : DATE :

ANSWER ALL QUESTIONS

Time : 90 Minutes Max. Marks : 30

CO BL PO Marks
1. a. Outline the security services, mechanisms and also classify 1 1 1,11 6
various security attacks

b. Describe Hill Cipher Algorithm in-detail 1 2 1,11 6

2. Illustrate Advanced Encryption Standard, with Key Expansion 2 3 1,2,11 12


Algorithm.
3. Define a) Euler’s Totient Function 2 4 1,2,11 6
b) Fermat’s Theorem
c) Euler’s Theorem
*****

VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY


NAMBURU (AUTONOMOUS)
YEAR/SEM : IV – B.Tech - I-Sem NAME OF THE EXAM : MID – I
SUBJECT : SUBJECT CODE :
BRANCH : DATE :

ANSWER ALL QUESTIONS

Time : 90 Minutes Max. Marks : 30

CO BL PO Marks
1. a. Illustrate various classical substitution and transposition ciphers 1 1 1,11 6

b. Write the algorithm for Extended Euclidean Algorithm (EEA). ii) 1 2 1,11 6
Given a=161 and b=28, find the gcd(a,b) and the values of s and t
using EEA.
2. a. What are the different modes of Block Ciphers, Explain with a 2 1 1,2,11 6
neat diagram
b. Explain the generation of sub keys and S Box from the given 2 4 1,2,11 6
32-bit key in Blowfish algorithm
3. a. Write Chinese Remainder Theorem and also give its 2 1 1,2,11 6
applications
*****
VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY
NAMBURU (AUTONOMOUS)
YEAR/SEM : IV – B.Tech - I-Sem NAME OF THE EXAM : MID – I
SUBJECT : SUBJECT CODE :
BRANCH : DATE :

ANSWER ALL QUESTIONS

Time : 90 Minutes Max. Marks : 30

CO BL PO Marks
1. a. Explain the various security attacks? What security mechanisms 1 1 1,11 6
are suggested to counter the passive and active attacks?
b. Encrypt the message “The key is hidden under the door pad” 1 1 1,11 6
with “GUIDANCE” as key word using Playfair Cipher.
2. a. Describe the encryption, decryption and key generation process 2 1 1,2,11 6
in DES Algorithm with Avalanche Effect
b. Write AES Key Expansion algorithm 2 2 1,2,11 6

3. a. Define Primitive roots and Discrete Logarithms 2 4 1,2,11 6

*****

You might also like