How To Exam?

a knowledge trading engine...


Vinayaka Missions University 2009 B.E Information Technology CRYPTOGRAPHY AND NETWORK SECURITY BANK - Question Paper

Wednesday, 22 May 2013 08:20Web

VINAYAKA MISSIONS UNIVERSITY, SALEM
SEMESTER: VI
SUBJECT: CRYPTOGRAPHY AND NETWORK SECURITY

UNIT-I
PART - A

1. What is cryptology?
2. What is the difference ranging from an unconditionally secure cipher and a computationally secure cipher?
3. Briefly describe the Caesar cipher.
4. Briefly describe the monoalphabetic cipher?
5. Briefly describe the playfair cipher.
6. elaborate the 2 issues with one-time pad?
7. What is a transposition cipher?
8. elaborate the 2 basic functions used in encryption algorithms?
9. How many keys are needed for 2 people to communicate via a cipher?
10. What is the difference ranging from a block cipher and a stream cipher?
11. elaborate the 2 approaches to attacking a cipher?
12. What is Steganography?
13. Why is it important to study feistel cipher?
14. Why is it not practical to use an arbitrary reversible substitution cipher?

PART-B

1.Explain the OSI Architecture.
2.Explain Classical Encryption Techniques.
3.Explain DES Algorithm.
4.Explain AES.
5.Describe about Traffic Confidentiality.
6.Explain about the subsequent
i)need for triple DES? (6)
ii)Write the disadvantages of double DES (6)
iii) Triple DES. (6)
7.Write short notes on the subsequent
i. Traffic analysis ii. Convert channel iii.Traffic padding


UNIT-II
PART -A

1. What is the purpose of the State array?
2. How is the S-box constructed?
3. Briefly define Sub Bytes.
4. What is the difference ranging from differential and linear cryptanalysis?
5. describe product cipher.
6. What was the original set of criteria used by NIST to evaluate candidate AES cipher?
7. What was the final set of criteria used by NIST to evaluate candidate AES ciphers?
8. What is power analysis?
9. Briefly define Shift Rows.
10. How many bytes in State are affected by Shift Rows?
11. Briefly define Mix Columns.
12. Briefly define Add Round Key.
13. Briefly define the Key Expansion Algorithm.
14. What is the difference ranging from Sub Bytes and Sub Word?
15. What is the difference ranging from Shift Rows and Rot Word?
16. What is triple encryption?

PART -B

1.Explain about the different Key management techniques.
2.Describe Diffie-Hellman Key Exchange.
3.Explain RSA algorithm.
4.Describe Public Key Cryptography.
5.Explain Elliptic Curve Architecture.
6.Write about
i)Elliptic curve architecture in detail. (6)
ii)Diffie – Hellman key exchange algorithm (6)



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Vinayaka Missions University 2009 B.E Information Technology CRYPTOGRAPHY AND NETWORK SECURITY BANK - Question Paper