Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Tuesday, July 15, 2008



Part –a 
1. What is the advantage and disadvantage of one time pad encryption algorithm.
2. If a bit error occurs in plain text block p1 , how far does the error propagate in CBC mode of DES.
3. When do we say an integer a, less than n is a primitive root of n. state the conditions for having at least one primitive root or n.
4. What for the miller-rabin algorithm is used.
5. Draw a simple public key encryption model that provides authentication alone.
6. Identify any two applications where one way authentication is necessary.
7. Why the leading two octets of message digest are stored in PGP message along with the encrypted message digest.
8. State any tow advantages of Oakley key determination protocol over diffie hellman key exchange protocol.
9. How are the passwords stored in password file in UNIX operating system.
10. What is meant by polymorphic viruses.

Part –b
11. A) i. Discuss any four substitution cipher encryption methods and list their merits and demerits .

ii. how are diffusion and confusion achieved in DES.

i. in AES, explain how the encryption key is expanded to produce keys for the 10 rounds.
ii. Explain the types of attacks on double DES and triple DES.

12. A)  
i. How are arithmetic operations on integers carried out from their residues modulo a set of pair wise relatively prime moduli. Give the procedure to reconstruct the integers form the residue.
ii. How is discrete logarithm evaluated for a number . what is the role of discrete logarithms in the diffie hellman key exchange in exchanging the secret key among two users.
b) i. Identify the possible threats for RSA algorithm and list their counter measures.
ii. state the requirements for the design of an elliptic curve crypto system. Using that , explain how secret keys are exchanged and messages are encrypted.

13. A).  
i. Describe digital signature algorithm and show how signing and verification is done using DSS.
ii. Consider any message M of length 4120 bits ending with ABCDEF in hexadecimal form. Construct the last block of message to be given as input for the MD5.
  b) i. Explain the processing of a message block of 512 bits using SHA1.
ii. write about the symmetric encryption approach for digital signatures.

14. a) i.Describe the authentication dialogue used by Kerberos for obtaining services from another realm.
ii. Explain with the help of an example how a user’s certificate is obtained from another certification authority in x509 scheme.
b). i. what are the functions included in MIME in order to enchance security how are they done..
ii. why does PGP maintain key rings with every users. Explain how the messages are generated and received by pgp.
15). A)  
i. Explain any tow approached for intrusion detection.
ii. Suggest any three password selection strategies and identify their advantages and disadvantages if any.
b). i. Identify a few malicious programs that need a host program for their existence.
ii. Describe the familiar types of firewall configurations.


  1. I was searching for CRYPTOGRAPHY AND NETWORK SECURITY paper of Anna University.But this blog is of 2008 so the paper might be of year 2007 can you share a link or paper itself of last year.It will really help if i can find papers of previous 4 years

  2. if any one knws d answer for 13)a)ii) pls send d ans to my mail pls pls ASAP