Sunteți pe pagina 1din 5

Code No: RR410504

Set No. 1

IV B.Tech I Semester Regular Examinations, November 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) What is it importance to study the Feistel cipher? [8]

(b) Which parameters and design choices determine the actual algorithm of a Feistel cipher? [8] 2. Explain the process of encryption and decryption in IDEA algorithm. 3. List four general categories of schemes for distribution of public keys. 4. (a) Explain Chinese Remainder Theorem. (b) State and prove Eulers theorem? (c) Using Fermats theorem, nd 201 mod 11. 5. (a) List requirements for a Hash Function. (b) What basic arithmetical and logical functions are used in SHA-1? 6. (a) What is R64 conversion? (b) Why is R64 conversion useful for an e-mail application? (c) Why is the segmentation and reassembly function in PGP needed? [4+6+6] 7. (a) Give examples of applications of IPSec. (b) What services does IPSec provide? 8. Write notes on (a) Viruses (b) Worms (c) Bacteria [6+6+4] [8+8] [6+10] [5+5+6] [16] [16]

1 of 1

Code No: RR410504

Set No. 2

IV B.Tech I Semester Regular Examinations, November 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) What are dierences between a block cipher and a stream cipher? (b) Explain various modes of operations of block ciphers. 2. Explain the process of encryption and decryption in IDEA algorithm. 3. (a) Explain public key Crypto Systems. (b) Explain in detail about Euclids Algorithm. (c) Give a brief account on Random number Generation. 4. (a) Explain in detail about Euclids Algorithm. (b) Determine gcd(1970,1066). 5. (a) What is a dierence between little-endian and big-endian format? (b) What basic arithmetical and logical functions are used in MD5? 6. (a) What is R64 conversion? (b) Why is R64 conversion useful for an e-mail application? (c) Why is the segmentation and reassembly function in PGP needed? [4+6+6] 7. Write note on Encapsulating security payload. 8. (a) what information used by a typical packet-ltering router? (b) What are some weaknesses of a packet-ltering router? (c) What is the dierence between a packet-ltering router and a stateful inspection rewall? [8+4+4] [16] [6+10] [8+8] [8] [8] [16] [6] [5] [5]

1 of 1

Code No: RR410504

Set No. 3

IV B.Tech I Semester Regular Examinations, November 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. (a) What is it importance to study the Feistel cipher? (b) What is the purpose of the S-boxes in DES? 2. (a) List the characteristics of advanced block ciphers. (b) What are the dierences between RC5 and RC2? 3. (a) Explain Die-Hellman Key Exchange in Elliptic curve cryptography? (b) Explain the process encryption and decryption in Elliptic curve cryptography? [8+8] 4. (a) Explain Miller-Robin test algorithm. (b) Explain Chinese Remainder Theorem . 5. (a) What is the dierence between weak and strong collision resistance? (b) What is the role of a compression function in a hash function? 6. (a) What is R64 conversion? (b) Why is R64 conversion useful for an e-mail application? (c) Why is the segmentation and reassembly function in PGP needed? [4+6+6] 7. Write note on Encapsulating security payload. 8. Write notes on (a) Trapdoors (b) Logic bomb (c) Trojan horses [5+5+6] [16] [6+10] [8+8] [10] [6] [8] [8]

1 of 1

Code No: RR410504

Set No. 4

IV B.Tech I Semester Regular Examinations, November 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks 1. This problem provides a numerical example of encryption using a one-round version of DES. We start with the same bit pattern for the key and plain text, namely, In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 (a) Derive K1 , the rst - round subkey. (b) Derive L0 , R0 (c) Expand R0 to get E[R0 ] (d) Calculate A=E[R0 ] K1 . (e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding S-box substitutions. (f) Cancatenate the results of (e) to get a 32-bit result,B. (g) Apply the permutation to get P(B). (h) Calculate R1=P(B) L0 (i) write down the cipher text. 2. (a) List the characteristics of advanced block ciphers. (b) What are the dierences between RC5 and RC2? 3. (a) What is an Elliptic Curve? (b) What is the Zero point of an elliptic curve? [16] [8] [8] [4] [2]

(c) Explain the process encryption and decryption in Elliptic curve Cryptography? [10] 4. (a) Dene a Groups, a Rings and a Fields? (b) Construct Additive table and Multiplicative table for GF(7)? 5. Dene digital Signature. Explain its role in network security. 6. (a) What is R64 conversion? (b) Why is R64 conversion useful for an e-mail application? (c) Why is the segmentation and reassembly function in PGP needed? [4+6+6] [6+10] [16]

1 of 2

Code No: RR410504

Set No. 4
[8+8]

7. (a) List and briey dene the business requirements for secure payment processing with credit cards over the Internet. (b) List and briey dene the principal categories of SET participants. 8. Write notes on (a) Viruses (b) Worms (c) Bacteria [6+6+4]

2 of 2

S-ar putea să vă placă și