Sunteți pe pagina 1din 5

campusexpress.co.

in

Code No: RR410504 Set No. 1


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. Write short notes on

(a) Symmetric model [4M]


(b) Cryptography [4M]
(c) Cryptanalysis [4M]

.in
(d) Steganography [4M]

2. (a) List the characteristics of advanced block ciphers. [8M]

.co
(b) What are the differences between RC5 and RC2? [8M]

3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M]


ss
(b) Consider a diffie-helman scheme with a common prime q=11 and a primitive
re
rootα=2
i. If user A has public key YA = 9, what is A’s private key XA ?
xp

ii. If user B has public key YB = 3, what is the shared key K? [10M]
se

4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
the following congruences:
pu

(a) 17x2 ≡ 10 mod 29


(b) x2 −4x − 16 ≡ 0 mod 29
m

(c) x7 ≡ 17 mod 29 [5+5+6]


ca

5. (a) what are digital signature standards?


(b) Explain Digital signature algorithm. [8+8]

6. (a) What problem was Kerberos designed to address?


(b) What are three threats associated with user authentication over a network or
Internet?
(c) List three approaches to secure user authentication over a network or Internet?
[4+4+8]

7. (a) What is replay attack?


(b) Why does ESP include a padding field? [6+10]

8. (a) what information used by a typical packet-filtering router?

1 of 2
http://www.campusexpress.co.in
campusexpress.co.in

Code No: RR410504 Set No. 1


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

.in
.co
ss
re
xp
se
pu
m
ca

2 of 2
http://www.campusexpress.co.in
campusexpress.co.in

Code No: RR410504 Set No. 2


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) What is Steganography? [6M]


(b) Explain various modes of operations of block ciphers [10M]
2. (a) List the characteristics of advanced block ciphers. [8M]
(b) What are the differences between RC5 and RC2? [8M]

.in
3. (a) Explain the process encryption and decryption in Elliptic curve cryptography?
[8M]

.co
(b) Explain the additive rules of Elliptic Curve Cryptography? [8M]
4. (a) Explain Chinese Remainder Theorem.
(b) State and prove Euler’s theorem?
(c) Using Fermat’s theorem, find 201 mod 11.
ss [5M+5M+6M]
re
5. (a) What is a message authentication code?
xp

(b) What is difference between message authentication code and a one-way hash
function?
se

(c) In what ways can a hash value be secured so as to provide message authenti-
cation?
pu

[5+5+6]
m

6. (a) What is R64 conversion?


ca

(b) Why is R64 conversion useful for an e-mail application?


(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
7. Write a short note on
(a) Electronic mail Services
(b) Firewalls [8+8]
8. (a) what information used by a typical packet-filtering router?
(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

1 of 1
http://www.campusexpress.co.in
campusexpress.co.in

Code No: RR410504 Set No. 3


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis. [8M]

2. (a) List the characteristics of advanced block ciphers. [8M]


(b) What are the differences between RC5 and RC2? [8M]

.in
3. (a) What is a one-way function?
(b) What is trap-door one-way function?

.co
(c) Describe in general terms an efficient procedure for picking a prime number?
[5+5+6]
ss
4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
re
the following congruences:
xp

(a) 17x2 ≡ 10 mod 29


(b) x2 −4x − 16 ≡ 0 mod 29
se

(c) x7 ≡ 17 mod 29 [5+5+6]


pu

5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
m

6. Explain X.509 Authentication services [16]


ca

7. (a) List and briefly define the parameters that define an SSL session state?
(b) List and briefly define the parameters that define an SSL session connection?
[8+8]

8. (a) what information used by a typical packet-filtering router?


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

1 of 1
http://www.campusexpress.co.in
campusexpress.co.in

Code No: RR410504 Set No. 4


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) What are differences between a block cipher and a stream cipher? [8M]
(b) Explain various modes of operations of block ciphers. [8M]

2. (a) List the characteristics of advanced block ciphers. [8M]


(b) What are the differences between RC5 and RC2? [8M]

.in
3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)

.co
[8M]
(b) For E11(1,6) , consider the point G=(2,7) Compute the multiples of G from
2G through 4G ss [8M]
re
4. (a) Explain in detail about Extended Euclid’s Algorithm.
(b) Using above algorithm find the multiplicative Inverse of 1234 mod 4321. [8+8]
xp

5. (a) List requirements for a Hash Function.


se

(b) What basic arithmetical and logical functions are used in SHA-1? [6+10]
pu

6. (a) What is R64 conversion?


(b) Why is R64 conversion useful for an e-mail application?
m

(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
ca

7. Write note on Encapsulating security payload. [16]

8. Write notes on

(a) Fire walls


(b) Trojan Horse Defense [8+8]

⋆⋆⋆⋆⋆

1 of 1
http://www.campusexpress.co.in

S-ar putea să vă placă și