2023 2024 EduVark > Education Discussion > General Discussion


  #1  
September 16th, 2016, 10:38 AM
Super Moderator
 
Join Date: Mar 2012
Cryptography and Network Security UPTU Paper

Can you provide me B Tech previous year question paper of TIT-701 Cryptography and Network Security of UPTU or Uttar Pradesh Technical University?

B Tech previous year question paper of TIT-701 Cryptography and Network Security of UPTU or Uttar Pradesh Technical University is as follows:

1 Attempt any four questions :

(a) Explain Feistel Encryption and Decryption algorithms. \&hat is the difference between Dffi-rsion and Confusion?
(b) Compare and contrast substitution techniques with Transposition techniques under classical encry.ption.
(c) What is the most security-critical component of DES round function? Give a brief description of this function.
(d) What is the difference between block cipher and stream cipher? What are the diflerent modes of block cipher operation? Explain any one of them.
(e) What is the idea behind meet-in-middle attack? How it can be avoided in 3 DES?
(f) The Hill Cipher uses the following key for enciphering the message.
(z ,\ K=l I
[s 7)
Obtain ttre decryption key used for deciphering the cipher text.


2. Attempt any four questions
(a) Desuibe RSA algorithn1 encryption and decryption function, In RSA given e:07 and n:33, encrypt the message "ME" using 00 to 25 for letters A. to Z.
(b) Write the pseudo code for Miller Rabin primality testing. Test whether 61 is prime or not using the same Miller Rabin test.
(c) Describe the Fermat's Little 'fheorem. Llsing Fermat's theorem, find the value of 3?0r mod 11 .
(d) Define Ring and Field. Give an example of ring which is not a field.
(e) Illustrate the concept of Chinese Remainder Theorem. By using Chinese Remainder Theorem solve the simultaneous congruence X = 2 mod P for all P € {3, 5, 7}
(f) Describe Diffie-Hellrnan Key Exchange Algorithm. Users A& B use the Diffie-Hellman key exchange technique a common prime q:83 and a primitive root a:13.
i. If user A has private key 5, what is As public key?
ii. If user B has private key 12, what is B's public key?
iii. What is the shared key?

Cryptography and Network Security UPTU Question Paper





Last edited by Neelurk; April 7th, 2020 at 10:48 AM.
Similar Threads
Thread
Network Analysis Question Paper Pune University
Network Security Anna University Question Papers
UPTU Question Paper
EME UPTU Paper
Mercy Paper UPTU
Security Printing and Minting Corp of India Ltd/Security Paper Mill Hoshangabad
UPTU CS Paper
Network Security Syllabus Anna University
Model paper for IB Security Assistant
Intelligence bureau security Model question paper
PG Network Security admission After Degree
Courses on Hardware Networking & Network Security
PTU, M.Tech ECE , Data Communication Network Exam Paper
Mumbai University BE in Instrumentation, 3rd Sem. Electrical Network Exam paper
IB security assistant paper



Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 10:31 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8