Sunteți pe pagina 1din 1

2.

With a neat flowchart, describe MD5 processing of single


512 block.
[nov/dec 2013] (8)
(or)
(b).1. Enumerate the properties of hash function.
[nov/dec 2014]

Branch : ECE
Date & Time: 10.09.2015 &1.15 to 4.15 PM
Semester: VII
Max.mark:100
Sub.code &Title: EC2035 cryptography and network security

1.
2.
3.

4.
5.
6.
7.

INTERNAL TEST-II
PART -A (10*2=20)
(Answer the entire question)
List the importance features of Kerberos Version 5. [nov/dec 2014]
What are the important services offered by PGP?
[nov/dec 2013]
Why does an ESP include the padding field?
[nov/dec 2013]
Write down the steps involved in SSL required protocol.
Draw an X.509 message format.
Give the authentication requirements.
[nov/dec 2013]
Distinguish between entity and message authentication.
[nov/dec 2013]

8. Compare direct and arbitrated digital signature.


9. Differentiate MD5, SHA-1, RIPEMD-160.
10. Define the classes of message authentication function.

(8)

2. Describe the denning authentication protocols and list its


limitations, how the limitations overcome.[nov/dec 2013] (8)
12. (a).Explain in detail about the diagram of SHA-512 processing of
a single 1024 bit blocks.
[nov/dec 2014] (16)
(or)
(b).Explain about HMAC and RIPEMD
(16)
13. (a).With neat block diagram, explain the services of SSL
protocols.
[nov/dec 2013] (16)
(or)
(b).Explain the concept and types of digital signature.
(16)
14. (a). What is Kerberos? Explain how it provides authentication
services in two approaches.
[nov/dec 2014] (16)
(or)
(b).Explain in detail about concept and functionality of S/MIME.
[nov/dec 2014]

(16)

15. (a).Explain the benefit, applications and operational modes of


IP security.
[nov/dec 2013] (16)
(or)
(b).Explain the Operational Description and message format of PGP.
[nov/dec 2013] (16)

PART- B (5*16=80 marks)


(Answer the entire question)
11. (a).1. Explain in detail in message authentication code and its
requirements.
[nov/dec 2013]

(8)

Faculty I/C

HOD/ECE

S-ar putea să vă placă și