B.Tech. III Semester
Examination, December 2025
Grading System (GS)
Max Marks: 70 | Time: 3 Hours
Note:
i) Attempt any five questions.
ii) All questions carry equal marks.
a) Define cryptography and explain symmetric-key encryption. (Unit 1)
b) Discuss historical ciphers and the concept of computational security. (Unit 1)
a) Explain perfect secrecy with reference to one-time pad encryption. (Unit 1)
b) Discuss characterizations and limitations of perfect secrecy. (Unit 1)
a) Explain CPA-secure ciphers constructed from PRFs. (Unit 2)
b) Discuss modes of operation of block ciphers with examples. (Unit 2)
a) Explain DES and AES algorithms highlighting their features. (Unit 2)
b) Discuss Message Authentication Codes and cryptographic hash functions. (Unit 2)
a) Explain Brute force and cryptanalysis in cryptography with the help of related example. (Unit 1)
b) Discuss birthday attacks and applications of cryptographic hash functions. (Unit 3)
a) Explain the random oracle model and authenticated encryption. (Unit 3)
b) Discuss generic constructions of authenticated encryption schemes. (Unit 3)
a) Explain Diffie Hellman key exchange and cyclic groups. (Unit 4)
b) Discuss discrete logarithm problem and elliptic curve cryptography. (Unit 4)
a) Explain CCA-secure public-key hybrid encryption schemes. (Unit 5)
b) Discuss Digital signatures, TLS/SSL and interactive protocols. (Unit 5)