Вы находитесь на странице: 1из 4

OR 6.

a) Define public key cryptography and explain RSA algorithm b) In RSA algorithm, if p=17, q=7 and d=5, then find e UNIT-IV 7. a) Define Authentication and digital signatures b) Explain HMAC algorithm OR 8. a) Explain MD5 algorithm b) Compare MD5 with SHA-1 algorithm UNIT-V 9. a) Differentiate PGP and PEM b) Explain x.509 directory authentication service OR 10. a) Explain Kerberos in detail b) What are the goals of firewalls and explain the different types 8 4 6 6 8 4 6 6 8 4

[3,7/VII S/110]

[EURCS/EURIT-703]

B.Tech. DEGREE EXAMINATION CSE & IT


VII SEMESTER NETWORK SECURITY
(Effective from the admitted batch 200708) Time: 3 Hours Max.Marks: 60 --------------------------------------------------------------------------------- ------------------Instructions: Each Unit carries 12 marks. Answer all units choosing one question from each unit. All parts of the unit must be answered in one place only. Figures in the right hand margin indicate marks allotted. --------------------------------------------------------------------------------------- -------------

UNIT-I 1. a) Explain the classical encryption techniques b) Explain the fiestel proof of Data Encryption standard algorithm OR 2. a) Explain cipher block chaining mode and cipher block feed back mode. b) What is the impact of bit error and bit timing error in the above modes? UNIT-II 3. a) Explain Triple DES b) Explain Rijndael logic of AES OR 4. a) Explain RC4 in detail b) Write about Random number generation UNIT-III 5. a) Explain Diffie-Hellman Key exchange algorithm b) Explain man-in-the-middle attack 4 8 8 4 4 8

8 4 4 8

OR 6. a) Define public key cryptography and explain RSA algorithm b) In RSA algorithm, if p=17, q=7 and d=5, then find e UNIT-IV 7. a) Define Authentication and digital signatures b) Explain HMAC algorithm OR 8. a) Explain MD5 algorithm b) Compare MD5 with SHA-1 algorithm UNIT-V 9. a) Differentiate PGP and PEM b) Explain x.509 directory authentication service OR 10. a) Explain Kerberos in detail b) What are the goals of firewalls and explain the different types 8 4 6 6 8 4 6 6 8 4

[3,7/VII S/110]

[EURCS/EURIT-703]

B.Tech. DEGREE EXAMINATION CSE & IT


VII SEMESTER NETWORK SECURITY
(Effective from the admitted batch 200708) Time: 3 Hours Max.Marks: 60 --------------------------------------------------------------------------------- ------------------Instructions: Each Unit carries 12 marks. Answer all units choosing one question from each unit. All parts of the unit must be answered in one place only. Figures in the right hand margin indicate marks allotted. --------------------------------------------------------------------------------------- -------------

UNIT-I 1. a) Explain the classical encryption techniques b) Explain the fiestel proof of Data Encryption standard algorithm OR 2. a) Explain cipher block chaining mode and cipher block feed back mode. b) What is the impact of bit error and bit timing error in the above modes? UNIT-II 3. a) Explain Triple DES b) Explain Rijndael logic of AES OR 4. a) Explain RC4 in detail b) Write about Random number generation UNIT-III 5. a) Explain Diffie-Hellman Key exchange algorithm b) Explain man-in-the-middle attack 4 8 8 4 4 8

8 4 4 8