Professional Documents
Culture Documents
www.andhracolleges.com
1. Write short notes on
[8M]
[8M]
4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
www.andhracolleges.com
the following congruences:
⋆⋆⋆⋆⋆
www.andhracolleges.com
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
1. (a) What is Steganography?
(b) Explain various modes of operations of block ciphers
2. (a) List the characteristics of advanced block ciphers.
(b) What are the differences between RC5 and RC2?
3. (a) Explain the process encryption and decryption in Elliptic curve cryptography?
[8M]
(b) Explain the additive rules of Elliptic Curve Cryptography?
[6M]
[10M]
[8M]
[8M]
[8M]
4. (a) Explain Chinese Remainder Theorem.
(b) State and prove Euler’s theorem?
(c) Using Fermat’s theorem, find 201 mod 11. [5M+5M+6M]
5. (a) What is a message authentication code?
(b) What is difference between message authentication code and a one-way hash
function?
(c) In what ways can a hash value be secured so as to provide message authenti-
www.andhracolleges.com
cation?
[5+5+6]
6. (a) What is R64 conversion?
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
7. Write a short note on
(a) Electronic mail Services
(b) Firewalls [8+8]
8. (a) what information used by a typical packet-filtering router?
(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]
⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List
www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis.
[8M]
[8M]
[5+5+6]
4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
the following congruences:
www.andhracolleges.com
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function?
7. (a) List and briefly define the parameters that define an SSL session state?
(b) List and briefly define the parameters that define an SSL session connection?
[6+10]
[16]
[8+8]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What are differences between a block cipher and a stream cipher?
(b) Explain various modes of operations of block ciphers.
3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)
[8M]
[8M]
[8M]
[8M]
[8M]
(b) For E11(1,6) , consider the point G=(2,7) Compute the multiples of G from
2G through 4G [8M]
www.andhracolleges.com
6. (a) What is R64 conversion?
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
[8+8]
⋆⋆⋆⋆⋆