Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Tuesday, July 15, 2008

IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY

  R3414
B.E DEGREE EXAMINATION, NOV 2007
IT1352 – CRYPTOGRAPHY AND NETWORK SECURITY

Part –a 
1. What is avalanche effect.
2. What are the types of attacks on encrypted message.
3. Find gcd(56,86) using euclid’s algorithm.
4. Why elliptic curve cryptography is considered to be better than RSA.
5. what is masquerading.
6. Define weak collision property of a hash function.
7. what is x.509 standard.
8. Give IPSEC ESP FORMAT.
9. What are honey pots.
10. List down the four phases of virus.

Part –b
11. A) Discuss in detail encryption and decryption process of AES.

Or

b) 
i. Briefly explain design principles of block cipher.
ii. Discuss in detail block cipher modes of operation.

12. A)  
i. Discuss in detail RSA algorithm , highlighting its computational aspect and security.
ii. Perform decryption and encryption using RSA algorithm with p=3 q=11 e=7 and N=5.

Or
b) Briefly explain Deffie Hellman key exchange with an example.

13. A).  
i. Explain authentication functions in detail.
ii. What is meant by message digest give example.
 
Or
  b) i. Briefly explain digital signature algorithm.
ii. Discuss clearly secure hash algorithm.

14. a) i. What is Kerberos . Explain how it provides authenticated service.
ii. Explain the architecture of IPSEC.
Or
b). i. Explain handshake protocol actions of SSL.
ii. Discuss in detail secure electronic transaction.
15). A)  
i. Explain firewalls and how they prevent intrusions.
ii.Explain the concept of reference monitor.
Or
b). i. Define intrusion detection and the different types of detection mechanisms, in detail.
ii. Comment on password selection strategies and their significance.

2 comments:

  1. Oh thanks for posting the paper online.Good effort.It really helps in preparation.But can you share the latest paper.I hope that you will help me

    ReplyDelete