Sunteți pe pagina 1din 4

Code :R7411206 1

IV B.Tech I Semester(R07)Regular Examinations, November/December 2010


INFORMATION SECURITY
(Information Technology, Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain various Security mechanisms.


(b) Explain about VDP hijacking.

2. (a) How the fiestel structure is providing confusion and diffusion.


(b) Explain CAST - 128 algorithm in detail.

3. (a) Compare public-key cryptography with conventional cryptography.


(b) Perform encryption and decryption using RSA Algorithm for the following.
P=3 , q=11, e=17, M=8.

4. (a) Explain about S/MIME content types .


(b) Explain Generic transmission and reception of PGP messages along with figure.

5. (a) Compare tunnel mode with transport mode .


(b) Draw and explain the fields in authentication header.

6. (a) What is a dual signature and its purpose?


(b) Explain about handshake protocol .

7. (a) Explain about SNMP.


(b) Explain about statistical anamoly detection.

8. (a) Explain firewall configurations.


(b) Write about virus structure.

?????
Code :R7411206 2
IV B.Tech I Semester(R07)Regular Examinations, November/December 2010
INFORMATION SECURITY
(Information Technology, Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain TCP session hijacking.


(b) Explain man-in-the-middle attack .

2. (a) Consider the following.


Plaintext = “ Network Security ”
Key = “ Computer ”.
Find the corresponding cipher text using play fair cipher.
(b) Explain meet-in-the-middle attack in Triple DES.

3. Consider a Diffie- Heuman scheme with a common prime q=11, a primitive root α =2.

(a) Show that 2 is a primitive root of 11.


(b) If user ‘ A’ has public key YA =9, what is A’s private key XA ?
(c) If user ‘B’ has public key YB =3, what is the shared secret key K ?

4. Explain DSA algorithm.

5. (a) Draw and explain the fields in ESP header .


(b) Explain about Oakley Key determination protocol.

6. (a) Explain about SSl archietecture.


(b) Explain about secure electronic commerce components.

7. Explain about virus countermeasures.

8. (a) What are the various types of fire walls .


(b) Explain about Trusted system.

?????
Code :R7411206 3
IV B.Tech I Semester(R07)Regular Examinations, November/December 2010
INFORMATION SECURITY
(Information Technology, Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain about various security attacks .


(b) Draw and explain the model for Internetwork security.

2. (a) What is meant by “ Unconditionally Secure ” and “ Computationally Secure ”.


(b) Explain Sub-key generation in Blowfish algorithm.

3. Users A and B use the Diffie-Herrman key exchange technique, a common prime q=71, primitive
root α =7.

(a) If user A has private key XA = 5, what is A’s public key YA .


(b) If user B has private key XB = 12, what is B’s public key YB .
(c) What is the shared secret key?

4. Write about Security of RSA algorithm?

5. (a) Explain about encapsulating security payload .


(b) Explain ISAKMP.

6. Explain secure electronic transaction.

7. (a) Explain SNMP VI community facility.


(b) Draw and explain the architecture for distributed intrusion detection.

8. (a) Explain various types of malicious programs.


(b) Write about firewall characteristics.

?????
Code :R7411206 4
IV B.Tech I Semester(R07)Regular Examinations, November/December 2010
INFORMATION SECURITY
(Information Technology, Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE questions
All questions carry equal marks
?????

1. (a) Explain about ARP attacks.


(b) Explain various Security services.

2. (a) Explain SHA-I algorithm indetail.


(b) What is the difference between secret key, private key and public key.

3. (a) Explain about Kerberos.


(b) Draw and explain fields in X.509 Certificate .

4. (a) Draw and explain the fields in PGP message format.


(b) Explain S/MTME functionality.

5. Explain about TP security architecture in detail.

6. (a) Explain SSL record protocol operation.


(b) Explain about transport layer security.

7. Explain password management in detail.

8. (a) Explain about various firewall configurations .


(b) Write about Zombie.

?????

S-ar putea să vă placă și