C&ns Midi 3sets 22-23-19bq
C&ns Midi 3sets 22-23-19bq
C&ns Midi 3sets 22-23-19bq
NAMBURU (AUTONOMOUS)
YEAR/SEM : IV – B.Tech - I-Sem NAME OF THE EXAM : MID – I
SUBJECT : SUBJECT CODE :
BRANCH : DATE :
CO BL PO Marks
1. a. Outline the security services, mechanisms and also classify 1 1 1,11 6
various security attacks
CO BL PO Marks
1. a. Illustrate various classical substitution and transposition ciphers 1 1 1,11 6
b. Write the algorithm for Extended Euclidean Algorithm (EEA). ii) 1 2 1,11 6
Given a=161 and b=28, find the gcd(a,b) and the values of s and t
using EEA.
2. a. What are the different modes of Block Ciphers, Explain with a 2 1 1,2,11 6
neat diagram
b. Explain the generation of sub keys and S Box from the given 2 4 1,2,11 6
32-bit key in Blowfish algorithm
3. a. Write Chinese Remainder Theorem and also give its 2 1 1,2,11 6
applications
*****
VASIREDDY VENKATADRI INSTITUTE OF TECHNOLOGY
NAMBURU (AUTONOMOUS)
YEAR/SEM : IV – B.Tech - I-Sem NAME OF THE EXAM : MID – I
SUBJECT : SUBJECT CODE :
BRANCH : DATE :
CO BL PO Marks
1. a. Explain the various security attacks? What security mechanisms 1 1 1,11 6
are suggested to counter the passive and active attacks?
b. Encrypt the message “The key is hidden under the door pad” 1 1 1,11 6
with “GUIDANCE” as key word using Playfair Cipher.
2. a. Describe the encryption, decryption and key generation process 2 1 1,2,11 6
in DES Algorithm with Avalanche Effect
b. Write AES Key Expansion algorithm 2 2 1,2,11 6
*****