Sei sulla pagina 1di 5

www.andhracolleges.

com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 1


IV B.Tech I Semester Regular Examinations, November 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) Which parameters and design choices determine the actual algorithm of a
Feistel cipher?

2. Explain the process of encryption and decryption in IDEA algorithm.

3. List four general categories of schemes for distribution of public keys.

4. (a) Explain Chinese Remainder Theorem.


(b) State and prove Euler’s theorem?
[8]
[8]

[16]

[16]

(c) Using Fermat’s theorem, find 201 mod 11. [5+5+6]

5. (a) List requirements for a Hash Function.


(b) What basic arithmetical and logical functions are used in SHA-1? [6+10]

6. (a) What is R64 conversion?


(b) Why is R64 conversion useful for an e-mail application?

www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

7. (a) Give examples of applications of IPSec.


(b) What services does IPSec provide? [8+8]

8. Write notes on

(a) Viruses
(b) Worms
(c) Bacteria [6+6+4]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 2


IV B.Tech I Semester Regular Examinations, November 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What are differences between a block cipher and a stream cipher?
(b) Explain various modes of operations of block ciphers.

2. Explain the process of encryption and decryption in IDEA algorithm.

3. (a) Explain public key Crypto Systems.


(b) Explain in detail about Euclid’s Algorithm.
(c) Give a brief account on Random number Generation.
[8]
[8]

[16]

[6]
[5]
[5]

4. (a) Explain in detail about Euclid’s Algorithm.


(b) Determine gcd(1970,1066). [8+8]

5. (a) What is a difference between little-endian and big-endian format?


(b) What basic arithmetical and logical functions are used in MD5? [6+10]

6. (a) What is R64 conversion?


(b) Why is R64 conversion useful for an e-mail application?

www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

7. Write note on Encapsulating security payload. [16]

8. (a) what information used by a typical packet-filtering router?


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 3


IV B.Tech I Semester Regular Examinations, November 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) What is the purpose of the S-boxes in DES?

2. (a) List the characteristics of advanced block ciphers.


(b) What are the differences between RC5 and RC2?

3. (a) Explain Diffie-Hellman Key Exchange in Elliptic curve cryptography?


(b) Explain the process encryption and decryption in Elliptic curve cryptography?
[8+8]
[10]
[6]

[8]
[8]

4. (a) Explain Miller-Robin test algorithm.


(b) Explain Chinese Remainder Theorem . [8+8]

5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]

6. (a) What is R64 conversion?

www.andhracolleges.com
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

7. Write note on Encapsulating security payload. [16]

8. Write notes on

(a) Trapdoors
(b) Logic bomb
(c) Trojan horses [5+5+6]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 4


IV B.Tech I Semester Regular Examinations, November 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F

Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

(a) Derive K1 , the first - round subkey.


(b) Derive L0 , R0
(c) Expand R0 to get E[R0 ]
(d) Calculate A=E[R0 ] ⊕ K1 .
(e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding
S-box substitutions.
(f) Cancatenate the results of (e) to get a 32-bit result,B.
(g) Apply the permutation to get P(B).
(h) Calculate R1=P(B) ⊕ L0

www.andhracolleges.com
(i) write down the cipher text. [16]

2. (a) List the characteristics of advanced block ciphers. [8]


(b) What are the differences between RC5 and RC2? [8]

3. (a) What is an Elliptic Curve? [4]


(b) What is the Zero point of an elliptic curve? [2]
(c) Explain the process encryption and decryption in Elliptic curve Cryptography?
[10]

4. (a) Define a Groups, a Rings and a Fields?


(b) Construct Additive table and Multiplicative table for GF(7)? [6+10]

5. Define digital Signature. Explain its role in network security. [16]

6. (a) What is R64 conversion?


(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 4


7. (a) List and briefly define the business requirements for secure payment processing
with credit cards over the Internet.
(b) List and briefly define the principal categories of SET participants. [8+8]

8. Write notes on

(a) Viruses

www.andhracolleges.com
(b) Worms
(c) Bacteria [6+6+4]

⋆⋆⋆⋆⋆

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information

Potrebbero piacerti anche