Professional Documents
Culture Documents
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16]
3. (a) What are two different uses of public - key cryptography related to key Dis-
tribution? [6]
(b) Explain RSA Algorithm? [10]
www.andhracolleges.com ⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain.
(b) Write short notes on crypto analysis.
3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)[8]
(b) For E11(1,6), consider the point G=(2,7) Compute the multiples of G from
2G through 4G. [8]
[8]
[8]
[16]
www.andhracolleges.com
(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]
8. Write notes on
(a) Viruses
(b) Worms
(c) Bacteria. [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16]
8. (a) What are the three benefits that can be provided by an intrusion detection
system?
(b) What is the difference between rule-based anomaly detection and rule-based
penetration identification? [8+8]
www.andhracolleges.com ⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16]
5. (a) Is it necessary to recover the secret key in order to attack a MAC algorithm?
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
8. (a) List and briefly define three classes of intruders.
(b) What are two common techniques used to protect a password file? [8+8]
⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List