Вы находитесь на странице: 1из 2

G 1649 (pages;Z) Rog. No-..........

Name..............,.

B.TECII. DEGREE EXAMINAIION, IT{AY 2OI5


' Eighth Semester
Branch : Computer Science and Engineering
CS O1O 803-..SECIJRTTY IN COMPUTING (CS)
(New Scheme-. 2010 Admission onrnards)
lRegular/Supplemeotaryl
T'ime : Three Hours Maximum : 100 Marks
Pert A
Aruwer all questians.
Each questinn carrics g narhs.
1. What are the different types of attacL ?
2. Define Euler's theorem.
3. List out the requirements for Message Authentication.
4. What is mea t by Pretty Good Privacy ?
5. Explain the term Intruders,
(5x3=15marks)
. Part B
Answer all questians.
Each questinn carries 5 nwrhs.
6. Writ€ in detail about Security Attacks.
7. Explain about Avalanche Efrect.
8. Describe the Message Authentication codes. .

9. Explain in detail about Secure Socket Layer.


10. Define the File Protection Mechanisurs.
(5x5=25marks)
Pert C
Answer all questians.
'
Eoch Qucstinn carrizs 12 marhs.
11. Discuss in detail about security services and mechanisms.

Or
12. Explain in detail about classical encryption techniques.
' T\rrn over
.t

G 1649
- 13. (a) Elaborate the DES Algorithm. (6 marks)
(b) Briefly describe the Fermat's Theorem. (6 marks)

Or
14. Elaborate the principles of Public Key Cryptography Systems.

15. Write in detail about Secure Hash Algorithi.


Ot
16. Explain about X.609 Authentication Service.

17. Explain the architecture of IP Security.


Or
18. Discuss iD detail about Transport layer security.

19. Define Bell-La Padula Confidentiality Model.


Or
20. Describe in detail about Viruses and Related Threats.

(5xf2=60marks)

Вам также может понравиться