Вы находитесь на странице: 1из 15

Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & T
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & T
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

Anna University

B.E./B.Tech. DEGREE EXAMINATION, November/December 2012

Seventh Semester

Computer Science and Engineering

IT2352/IT 62 CRYPTOGRAPHY AND NETWORK SECURITY

(Regulation 2008)

Part A

1.What is the difference between a mono alphabetic and a poly alphabetic cipher?

2.What is an avalanche effect?

3.What are the disadvantages of double DES?

4.Define primitive root.

5.What is one-way property?

6.What are the two approaches of digital signatures?

7.What are the different types of MIME?

8.What protocols comprise SSL?

9.What is an Intruder?

10.Give few examples for worms.

Part B

11.a.Explain briefly about Fermats and Eulers theorems.

(or)

b.Explain the following with suitable examples.

12.a.Discuss about DES in detail.

(or)

www.Vidyarthiplus.com Page 1

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

b.Explain briefly about RSA and discuss its merit.

13.a.Explain briefly about Diffie Hellman key exchange algorithm with its pros and cons.

(or)

b.Describe about Hash functions.

14.a.Write about PGP in detail.

(or)

b.Explain in detail about SET.

15.a.Explain about viruses in detail.

(or)

b.Explain in detail about firewalls.

www.Vidyarthiplus.com Page 2

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

ANNA UNIVERSITY
B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2011.
Seventh Semester
Computer Science and Engineering
IT 2352 – CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Sixth Semester Information Technology)
(Regulation 2008)

Time : Three hours Maximum : 100 marks


Answer ALL questions.
PART A — (10 × 2 = 20 marks)

1. Give the types of attack.


2. List out the problems of one time pad?
3. Write down the purpose of the S-Boxes in DES?
4. Define : Diffusion.
5. Define: Replay attack.
6. List out the parameters of AES.
7. Define : Primality test.
8. State the difference between conventional encryption and public-key encryption.
9. Define : Malicious software.
10. Name any two security standards.

PART B — (5 × 16 = 80 marks)

11. (a) Using play fair cipher algorithm encrypt the message using the key "MONARCHY"
and explain.
Or
(b) Explain the ceaser cipher and monoalphabetic cipher.

12. (a) Explain the Key Generation, Encryption and Decryption of SDES algorithm in detail.
Or
(b) Write the algorithm of RSA and explain with an example.

13. (a) Illustrate about the SHA algorithm and explain.


Or
(b) Write a detailed note on Digital signatures.

www.studentsfocus.com
Fatima Michael College of Engineering & Technology
Fatima Michael College of Engineering & Technology

14. (a) Describe the SSL Architecture in detail.


Or
(b) List out the participants of SET system, and explain in detail.

15. (a) Explain the types of Intrustion Detection Systems.


Or
(b) Explain the different types of firewall and its configurations in detail.

www.studentsfocus.com
Fatima Michael College of Engineering & Technology

Вам также может понравиться