How To Exam?

a knowledge trading engine...


Vinayaka Missions University 2009 B.E Information Technology CRYPTOGRAPHY AND NETWORK SECURITY _ BANK - Question Paper

Wednesday, 22 May 2013 08:20Web
7.Explain the return try (or) importance purpose of Chinese remainder theorem.
8.Explain the RSA algorithm in detail with 1 suitable example.


UNIT III
PART -A

1. List important design considerations for a stream cipher.
2. Why is it not desirable to reuse a stream cipher key?
3. What primitive operations are used in Blowfish?
4. What is traffic padding and what is its purpose?
5. List ways in which secret keys can be distributed to 2 communicating parties.
6. What is the difference ranging from a session key and a master key?
7. What is nonce?
8. What is key distribution center?
9. What is the difference ranging from statistical randomness and unpredictability?
10. What is the difference ranging from Rijndael and AES?
11. Why is the middle portion of 3DES a decryption rather than an encryption?
12. What is the difference ranging from the AES decryption algorithm and the equivalent inverse cipher?
13. State fermat’ s theorem.

PART-B
1.Explain Authentication Functions.
2.Describe HMAC algorithm.
3.Describe RIPEMD-160.
4.Explain Hash Functions.
5.Explain Digital Signature Standard.
6.Explain about authentication requirement and functions in detail.
7.Explain about the basic uses of hash functions?
8.Explain the subsequent
i) Weak collision resistance ii) Strong collision resistance
9.Write short notes on the subsequent
i)One way property of hash functions ii)Computation resistance

UNIT- IV
PART - A

1. Differentiate public key encryption and conventional encryption.
2. Specify the application of public key cryptography.
3. Determine the gcd(24140,16762) using Euclid’s algorithm.
4.Perform encryption and decryption using RSA alg. For the subsequent.
P=7; q=11; e=17; M=8.
5.User A & B exchange the key using Diffie Hellman alg. presume
á=5 q=11 XA=2 XB=3. obtain YA, YB, K.
6. What is message authentication?
7. describe the classes of message authentication function.
8. What you meant by MAC?
9. Specify the techniques for distribution of public key.
10. Specify the requirements for message authentication.
11. Differentiate internal and external fault control.
12. What you meant by hash function?
13. Differentiate MAC and Hash function?
14.Define Kerberos.

PART-B
1.Explain Kerberos.
2.Explain X.509 Authentication Services.
3.Describe Electronic Mail Security.
4.Explain about PGP services.
5.Describe S/MIME.
6.Describe about the requirement and various approaches of digital signature.
7.Write about
i)mutual authentication (6)
ii)one- way authentication (6)
8.Explain in detail.
i)digital signature algorithm (6)
ii) digital signature application. (6)
9.Compare RSA approach with DSS approach.
10.Explain about arbitrated Digital Signature in detail.





UNIT- V
PART - A

1. elaborate the services given by PGP services?
2. discuss the reasons for using PGP?
3. Why E-mail compatibility function in PGP needed?
4. Name any cryptographic keys used in PGP?
5. describe key Identifier?
6. List the limitations of SMTP/RFC 822?
7. describe S/MIME?
8. elaborate the elements of MIME?
9. elaborate the headers fields describe in MME?
10. What is MIME content kind &explain?
11.What are the key algorithms used in S/MIME?
12. provide the steps for preparing envelope data MIME?
13. What you mean by versioned certificate?
14. elaborate the function areas of IP security?
15. provide the application of IP security?

PART-B

1.Explain Intrusion Detection.
2.State and discuss Password Management.
3.Explain the Firewall Design Principles.
4.Describe about Trusted Systems.
5.Name a few Viruses and discuss it.
6.Explain in detail.
i)S / MIME. (6)
ii)1P security architecture (6)
7.Write briefly about
i)1P security protocol. (6)
ii)SSL and TLS. (6)
8.What is the difference ranging from transport mode and tunnel mode?







( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Vinayaka Missions University 2009 B.E Information Technology CRYPTOGRAPHY AND NETWORK SECURITY _ BANK - Question Paper