Академический Документы
Профессиональный Документы
Культура Документы
1
IV B.Tech I Semester Supplimentary Examinations, May/Jun 2009
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
in
1. Write short notes on
.
(b) Transposition cipher [5]
(c) Hill cipher. [6]
ld
2. Explain the process of encryption and decryption in IDEA algorithm. [16]
3. (a) List the differences between Conventional and public key Encryption.
or [8]
(b) List four general categories of schemes for distribution of public keys. [8]
8. Write notes on
⋆⋆⋆⋆⋆
1 of 1
Code No: RR410504 Set No. 2
IV B.Tech I Semester Supplimentary Examinations, May/Jun 2009
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
in
1. Discuss in detail Simple-DES. [16]
.
(b) What are the differences between RC5 and RC2? [8]
ld
3. (a) What are Principal elements of a public - key crypto systems? [8]
(b) What are the roles of the public and private key? [8]
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
7. (a) What parameters identify an SA and what parameters characterize the nature
of a particular SA?
Aj
(b) What is the difference between transport mode and tunnel mode? [8+8]
⋆⋆⋆⋆⋆
1 of 1
Code No: RR410504 Set No. 3
IV B.Tech I Semester Supplimentary Examinations, May/Jun 2009
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
in
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
.
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
ld
1000 1001 1010 1011 1100 1101 1110 1111
1 of 2
Code No: RR410504 Set No. 3
7. Write a note on IP security. [16]
in
⋆⋆⋆⋆⋆
.
ld
or
uW
nt
Aj
2 of 2
Code No: RR410504 Set No. 4
IV B.Tech I Semester Supplimentary Examinations, May/Jun 2009
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
in
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
.
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
ld
1000 1001 1010 1011 1100 1101 1110 1111
(b) Consider a diffie-helman scheme with a common prime q=11 and a primitive
rootα=2
i. If user A has public key YA = 9, what is A’s private key XA ?
Aj
ii. If user B has public key YB = 3, what is the shared key K? [10]
1 of 2
Code No: RR410504 Set No. 4
(b) List limitations of SMTP/822 scheme? [8+8]
8. Write notes on
in
(a) Viruses
(b) Worms
(c) Bacteria. [6+6+4]
.
⋆⋆⋆⋆⋆
ld
or
uW
nt
Aj
2 of 2