#1
September 16th, 2016, 10:38 AM
| |||
| |||
Cryptography and Network Security UPTU Paper
Can you provide me B Tech previous year question paper of TIT-701 Cryptography and Network Security of UPTU or Uttar Pradesh Technical University? B Tech previous year question paper of TIT-701 Cryptography and Network Security of UPTU or Uttar Pradesh Technical University is as follows: 1 Attempt any four questions : (a) Explain Feistel Encryption and Decryption algorithms. \&hat is the difference between Dffi-rsion and Confusion? (b) Compare and contrast substitution techniques with Transposition techniques under classical encry.ption. (c) What is the most security-critical component of DES round function? Give a brief description of this function. (d) What is the difference between block cipher and stream cipher? What are the diflerent modes of block cipher operation? Explain any one of them. (e) What is the idea behind meet-in-middle attack? How it can be avoided in 3 DES? (f) The Hill Cipher uses the following key for enciphering the message. (z ,\ K=l I [s 7) Obtain ttre decryption key used for deciphering the cipher text. 2. Attempt any four questions (a) Desuibe RSA algorithn1 encryption and decryption function, In RSA given e:07 and n:33, encrypt the message "ME" using 00 to 25 for letters A. to Z. (b) Write the pseudo code for Miller Rabin primality testing. Test whether 61 is prime or not using the same Miller Rabin test. (c) Describe the Fermat's Little 'fheorem. Llsing Fermat's theorem, find the value of 3?0r mod 11 . (d) Define Ring and Field. Give an example of ring which is not a field. (e) Illustrate the concept of Chinese Remainder Theorem. By using Chinese Remainder Theorem solve the simultaneous congruence X = 2 mod P for all P € {3, 5, 7} (f) Describe Diffie-Hellrnan Key Exchange Algorithm. Users A& B use the Diffie-Hellman key exchange technique a common prime q:83 and a primitive root a:13. i. If user A has private key 5, what is As public key? ii. If user B has private key 12, what is B's public key? iii. What is the shared key? Cryptography and Network Security UPTU Question Paper Last edited by Neelurk; April 7th, 2020 at 10:48 AM. |
|