PART – A (6 × 2 = 12 Marks)
Answer All Questions
1. State the requirements of network security.
2. What is cryptanalysis? List the possible attacks on cryptosystems.
3. How does steganography differ from cryptography?
4. Apply Brute-Force Cryptanalysis of Caesar Cipher on the given Cipher Text: "EXXEG
OE XSRGI" and find the Plain Text.
5. List down the properties of congruence.
6. Determine gcd (4655, 12075).
PART – B (2 × 5 = 10 Marks)
Answer All Questions
7. State the requirements of conventional encryption and describe the components
involved in the process with a neat sketch.
8. State the properties of Modular Arithmetic for Integers in Z .
PART – C (2 × 14 = 28 Marks)
Answer All Questions
9. (a)
(i) Encrypt the message "SONA COLLEGE" using the Playfair matrix with the key "ELITE"
and get the ciphertext.
(ii) Encrypt the following message using Rail Fence cipher with the key as 3. The plaintext is
"This is a secret message."
(or)For each of the following, consider as low, moderate, or high impact level for the loss of
confidentiality, availability, or integrity:
● a. A system storing sensitive data that is managing sensitive information such as
passwords.
● b. An administration system,
● c. The systems that are part of a psychological laboratory environment
OR
9. (b)
(i) Encrypt the given plain text using the keyword "ETHICS"
Plain Text: "EVERY ONE MUST FOLLOW" using Vigenere cipher.
(ii) Encrypt the message "MEET ME AT THE USUAL PLACE" using the Hill cipher with the
key . Show your calculations and the result.
10. (a)
(i) Discuss shortly the various active and passive attacks with examples.
(ii) Calculate the value of 12⁸ mod 14 using the congruence method.
OR
10. (b)
(i) Briefly define the three key objectives of computer security. Consider a payment gateway
system where a user pays for an item using their account via the payment gateway. How the
above mentioned security key objectives are ensured?
(ii) Prove that Z₁₇ is a field with respect to ‘+’ and ‘×’.