Вы находитесь на странице: 1из 7

Name : ……………………………………………………………

htt
Roll No. : ………………………………………………………..
Invigilator’s Signature : ………………………………………..

CS/B.TECH/IT/SEM-8/IT-803A/2013
p:/
2013
DATA COMPRESSION & CRYPTOGRAPHY
Time Allotted : 3 Hours Full Marks : 70
/q
The figures in the margin indicate full marks.
pap
Candidates are required to give their answers in their own words
as far as practicable.
er.

GROUP – A
( Multiple Choice Type Questions )

1. Choose the correct alternatives for any ten of the following :


wb

10 1 = 10

i) The principle of ……………… ensures that only the


sender and the intended recipients have access to the
contents of message.
ut .

a) confidentiality b) authentication

c) integrity d) access control.


a c.

ii) The ………………… attack is related to confidentiality.

a) interception b) fabrication

c) modification d) interruption.
in

8308 [ Turn over


CS/B.TECH/IT/SEM-8/IT-803A/2013

iii) Caesar Cipher is an example of


htt
a) Substitution Cipher

b) Transposition Cipher
p:/
c) substitution as well as Transposition Cipher
/q
d) none of these.

iv) Cryptanalyst is a person who


pap

a) devise cryptography solutions

b) attempt to break cryptography solutions


er.

c) both (a) and (b)

d) none of these
wb

v) The entropy of a character with highest frequency in a

string is
ut .

a) always highest

b) always lowest
a c.

c) may be highest

d) none of these.
in

8308 2
CS/B.TECH/IT/SEM-8/IT-803A/2013

vi) Which of the following is not a compression algorithm ?


htt
a) Delta Modulation

b) Arithmetic coding
p:/
c) Zero blank encoding

d) Message digest.
/q
vii) Digital signature is meant for

a) Authentication
pap
b) Confidentiality

c) Integrity

d) all of these.
er.

viii) IP Spoofing is also known as

a) Sniffing b) Spoofing

c) IP sniffing d) Packet Spoofing.


wb

ix) Technical standard for digital certificate is

a) X.503 b) X.508

c) X.509 d) X.505.
ut .

x) Vernam cipher is also called as

a) rail fence technique


a c.

b) one time pad

c) block cipher

d) running key cipher.


in

8308 3 [ Turn over


CS/B.TECH/IT/SEM-8/IT-803A/2013

xi) IDEA encrypts blocks of size


htt
a) 32 bits b) 16 bits

c) 64 bits d) 8 bits.
p:/
xii) If A and B want to communicate securely with each
other, B must not know

a) A’s private key b) A’s public key


/q
c) B’s private key d) B’s public key.
pap

GROUP – B
( Short Answer Type Questions )
Answer any three of the following. 3 5 = 15
er.

2. a) What are the needs of data compression ? 3

b) Is data compression one type of encryption ? Justify


your answer. 2
wb

3. Compare symmetric and asymmetric key cryptographic


algorithm.

4. Explain the concept of digital signature.


ut .

5. What are the different types of firewalls in security ?

6. a) When is an encryption algorithm said to be


a c.

computationally secure ? 2

b) What are the different types of attacks on computer


and network systems ? 3
in

8308 4
CS/B.TECH/IT/SEM-8/IT-803A/2013

GROUP – C
htt
( Long Answer Type Questions )
Answer any three of the following. 3 15 = 45

7. a) Consider a document containing the following string :


p:/
AAAAAAAAAAAABBCD.
/q
Apply Huffman coding to compress the document.

Assuming that the 7-bit ASCII codes are used for data
pap

transmissions, find out the compression ratio. 5

b) How does arithmetic coding differ from Huffman

coding ? 2
er.

c) Assume that the dictionary table contains 1024 entries

for Lempel-Ziv compression scheme and the average


wb

characters per word in the document is 5. Assuming

that the 7-bit ASCII codes are used for data

transmissions, find out the compression ratio. What are


ut .

the drawbacks of LZ compression ? 2+2


a c.

d) Find out the output codes for the string BABAABAAA

after application of LZW compression algorithm on it.

Show each of the steps. 4


in

8308 5 [ Turn over


CS/B.TECH/IT/SEM-8/IT-803A/2013

8. a) Explain the mechanism of vector quantization in brief.


htt
Is it entropy encoding or source encoding ? Justify.

3+2
p:/
b) An audio signal is encoded with 256 levels. In using
DPCM, it is assumed that the maximum difference
between successive samples can be only to 8 levels of
/q
the sampling scheme. Calculate the theoretical
maximum compression that can be obtained with the
pap
DPCM in terms of compression ratio. 2

c) How does ADPCM differ from DPCM ? 2

d) Explain the following terms : 3 2


er.

i) Compander

ii) Entropy of a source


wb

iii) Slope overload distortions and granular distortions.

9. a) Differentiate between lossy and lossless compression. 5

b) Explain the difference between static Huffman coding


ut .

and dynamic Huffman coding. 5

c) Explain with examples the concepts of RLE. 5


a c.

10. a) Explain how DES works. 8

b) What is the difference between DES and double DES ?


Explain with examples. 7
in

8308 6
CS/B.TECH/IT/SEM-8/IT-803A/2013

11. Write short notes on any three of the following : 3 5


htt
a) IDEA

b) Fractal compression
p:/
c) Biometric Authentication

d) Triple DES
/q
e) Discrete Cosine Transform ( DCT )
pap

f) IP Spoofing.
er.
wb
ut .
a c.
in

8308 7 [ Turn over

Вам также может понравиться