Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) Which parameters and design choices determine the actual algorithm of a
Feistel cipher?
[16]
[16]
www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
(a) Viruses
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What are differences between a block cipher and a stream cipher?
(b) Explain various modes of operations of block ciphers.
[16]
[6]
[5]
[5]
www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) What is the purpose of the S-boxes in DES?
[8]
[8]
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
www.andhracolleges.com
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
(a) Trapdoors
(b) Logic bomb
(c) Trojan horses [5+5+6]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16]
8. Write notes on
(a) Viruses
www.andhracolleges.com
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List