How To Exam?

a knowledge trading engine...


Birla Institute of Technology (BIT Mesra) 2006 MS Software Engineering Network Security (closed book) - Question Paper

Saturday, 19 January 2013 04:55Web

Birla Institute of Technology and Science, Pilani
Distance Learning Programmes Division
MS Software Engineering in Collaboration with Wipro Technologies
First Semester 2006 – 2007
Mid-semester exam
Regular
Course No. : SEWP ZG513
Course Name : Network Security
Nature of examination : Closed Book
Weightage : 40 %
Duration : two Hours
Date : August 26, 2006 (AN)
Note: Attempt all ques.. begin every ans from a fresh page

1 a) What is the difference ranging from an Unconditionally Secure Cipher and a Computationally Secure Cipher. -2-
b) What are the 2 issues with the 1 time pad. -3-

2) discuss the role of an initialization vector in the Cipher Block chaining mode. -5-

3) Explain the single round of DES Algorithm. -5-

4) With neat diagrams discuss Encryption & Decryption in
Blow Fish. -5-

5) What are the requirements of Public Key Cryptography. -5-

6) Explain the possible attacks on RSA. -5-

7) In a Public Key system using RSA ,you intercept the cipher text
C=10 sent to a user whose public key is e=5, n=35. What is plain text M. -5-

8) With neat diagrams list the basic uses of a Hash function. -5-




***************




( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Birla Institute of Technology (BIT Mesra) 2006 MS Software Engineering Network Security (closed book) - Question Paper