R3414
B.E DEGREE EXAMINATION, NOV 2007
IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY
Part –a
1. What is avalanche effect.
2. What are the types of attacks on encrypted message.
3. Find gcd(56,86) using euclid’s algorithm.
4. Why elliptic curve cryptography is considered to be better than RSA.
5. what is masquerading.
6. Define weak collision property of a hash function.
7. what is x.509 standard.
8. Give IPSEC ESP FORMAT.
9. What are honey pots.
10. List down the four phases of virus.
Part –b
11. A) Discuss in detail encryption and decryption process of AES.
Or
b)
i. Briefly explain design principles of block cipher.
ii. Discuss in detail block cipher modes of operation.
12. A)
i. Discuss in detail RSA algorithm , highlighting its computational aspect and security.
ii. Perform decryption and encryption using RSA algorithm with p=3 q=11 e=7 and N=5.
Or
b) Briefly explain Deffie Hellman key exchange with an example.
13. A).
i. Explain authentication functions in detail.
ii. What is meant by message digest give example.
Or
b) i. Briefly explain digital signature algorithm.
ii. Discuss clearly secure hash algorithm.
14. a) i. What is Kerberos . Explain how it provides authenticated service.
ii. Explain the architecture of IPSEC.
Or
b). i. Explain handshake protocol actions of SSL.
ii. Discuss in detail secure electronic transaction.
15). A)
i. Explain firewalls and how they prevent intrusions.
ii.Explain the concept of reference monitor.
Or
b). i. Define intrusion detection and the different types of detection mechanisms, in detail.
ii. Comment on password selection strategies and their significance.
Tuesday, July 15, 2008
Subscribe to:
Post Comments (Atom)
Great Post !
ReplyDeleteOh thanks for posting the paper online.Good effort.It really helps in preparation.But can you share the latest paper.I hope that you will help me
ReplyDelete