You are on page 1of 5

www.andhracolleges.

com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 1


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. Write short notes on

(a) Symmetric model


(b) Cryptography
(c) Cryptanalysis
(d) Steganography

2. (a) List the characteristics of advanced block ciphers.


(b) What are the differences between RC5 and RC2?
[4M]
[4M]
[4M]
[4M]

[8M]
[8M]

3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M]


(b) Consider a diffie-helman scheme with a common prime q=11 and a primitive
rootα=2
i. If user A has public key YA = 9, what is A’s private key XA ?
ii. If user B has public key YB = 3, what is the shared key K? [10M]

4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve

www.andhracolleges.com
the following congruences:

(a) 17x2 ≡ 10 mod 29


(b) x2 −4x − 16 ≡ 0 mod 29
(c) x7 ≡ 17 mod 29 [5+5+6]

5. (a) what are digital signature standards?


(b) Explain Digital signature algorithm. [8+8]

6. (a) What problem was Kerberos designed to address?


(b) What are three threats associated with user authentication over a network or
Internet?
(c) List three approaches to secure user authentication over a network or Internet?
[4+4+8]

7. (a) What is replay attack?


(b) Why does ESP include a padding field? [6+10]

8. (a) what information used by a typical packet-filtering router?


Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 1


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

www.andhracolleges.com

www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 2


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What is Steganography?
(b) Explain various modes of operations of block ciphers
2. (a) List the characteristics of advanced block ciphers.
(b) What are the differences between RC5 and RC2?
3. (a) Explain the process encryption and decryption in Elliptic curve cryptography?
[8M]
(b) Explain the additive rules of Elliptic Curve Cryptography?
[6M]
[10M]
[8M]
[8M]

[8M]
4. (a) Explain Chinese Remainder Theorem.
(b) State and prove Euler’s theorem?
(c) Using Fermat’s theorem, find 201 mod 11. [5M+5M+6M]
5. (a) What is a message authentication code?
(b) What is difference between message authentication code and a one-way hash
function?
(c) In what ways can a hash value be secured so as to provide message authenti-

www.andhracolleges.com
cation?
[5+5+6]
6. (a) What is R64 conversion?
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
7. Write a short note on
(a) Electronic mail Services
(b) Firewalls [8+8]
8. (a) what information used by a typical packet-filtering router?
(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 3


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis.

2. (a) List the characteristics of advanced block ciphers.


(b) What are the differences between RC5 and RC2?

3. (a) What is a one-way function?


(b) What is trap-door one-way function?
(c) Describe in general terms an efficient procedure for picking a prime number?
[8M]

[8M]
[8M]

[5+5+6]

4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
the following congruences:

(a) 17x2 ≡ 10 mod 29


(b) x2 −4x − 16 ≡ 0 mod 29
(c) x7 ≡ 17 mod 29 [5+5+6]

www.andhracolleges.com
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function?

6. Explain X.509 Authentication services

7. (a) List and briefly define the parameters that define an SSL session state?
(b) List and briefly define the parameters that define an SSL session connection?
[6+10]

[16]

[8+8]

8. (a) what information used by a typical packet-filtering router?


(b) What are some weaknesses of a packet-filtering router?
(c) What is the difference between a packet-filtering router and a stateful inspec-
tion firewall? [8+4+4]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information


www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh

Code No: RR410504 Set No. 4


IV B.Tech I Semester Supplementary Examinations, March 2006
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

www.andhracolleges.com
1. (a) What are differences between a block cipher and a stream cipher?
(b) Explain various modes of operations of block ciphers.

2. (a) List the characteristics of advanced block ciphers.


(b) What are the differences between RC5 and RC2?

3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)
[8M]
[8M]

[8M]
[8M]

[8M]
(b) For E11(1,6) , consider the point G=(2,7) Compute the multiples of G from
2G through 4G [8M]

4. (a) Explain in detail about Extended Euclid’s Algorithm.


(b) Using above algorithm find the multiplicative Inverse of 1234 mod 4321. [8+8]

5. (a) List requirements for a Hash Function.


(b) What basic arithmetical and logical functions are used in SHA-1? [6+10]

www.andhracolleges.com
6. (a) What is R64 conversion?
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]

7. Write note on Encapsulating security payload.

8. Write notes on

(a) Fire walls


(b) Trojan Horse Defense
[16]

[8+8]

⋆⋆⋆⋆⋆

Seminar Topics - Scholarships - Admission/Entrance Exam Notifications


1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List

www.andhracolleges.com Engineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information

You might also like