How To Exam?

a knowledge trading engine...


Cochin University of Science and Techology (CUST) 2005-7th Sem B.Tech Information Technology ,, IT 705 (C) Cryptography And Data Security (99 to 01 Ad) - Question Paper

Monday, 27 May 2013 04:15Web



O fStO.VII - OS - 070 (Z)

B. Tec ft. Degree VII Semester Examination, November 260$

IT 705 <C) CRYPTOGRAPHY AND DATA SECURITY

(1999/a 200! AJmisihtns)

O fStO.VII - OS - 070 (Z)

B. Tec ft. Degree VII Semester Examination, November 260$

Time: 3 Hours    Muuma Maifct: 100

Answer iili questions. All Questions carry equal niaxks.

I    ) lixplain liow eryployiaphy ditTcr from coding tltcory .    

b) Suppose that the plaintext "go" conespondslolJteciphercxlHlir\ when an Affine    

Cipher uxeslheencrypikm function * -* a** {1 (mod 26). Find the values of a and p.

Assume that (lie letters of the alphabets arc assigned the numbers as follows, abedefghij kl mnopqrsluvwxyz

t I 2 J 5 4 I t It II I) I) l< II It II II I) II )1 U H 1J

OH

II    a) I'ind the atcryiHkfli of the |>lailcxl "input" ond alter'* using tlic encryption function x -

I3* + 4 (mod 26). lUplom liow cryplogr*phy ditTcr from coding theory.

Assume ()ta( (lie letters of (lie alphabets arc assigned (Ik numbers as follows.

a h c d e f g Ii ] j kl mitopqrsl uvwxyx

i t ) s 6 1 i t It II I) I) II II l I! II It K II U 1) II 1)

O fStO.VII - OS - 070 (Z)

B. Tec ft. Degree VII Semester Examination, November 260$

b)    Discum (lie main objectives that arise in information security.    10

c)    Uxplain wlat do you mean by absolute security in cryptography?

III    a) What do you mean by double encryption is equivalent to single encryption? Is this jj

true til Uie case of DF.S?

b) lixplain the usage of Linear l;eedbockSliift Registers in Ccyptogtophy.    gg

OH

IV h) Discuss on DCS I us begun to stow signs of age'*.

!>) lixplain tlie role of Imile state nmchine hi cryptography.


2

Y it) Deinonstrote how nn NP-conipletc problem can he used Tor puhiic-key cry|>(0gro|)lty.

I>) Dcsciibc iit detail. litc RS A Algorithm wilh an example.

OR

VI a) Explain U>e possible approaches lo altnckuig die RSA olgorKhnv

b) IJcscribein udnil, tl*c public key systems based on elliptic curves wiili an example.

VU a) Ilxplain cfincfent Cryptographic protocol*.

I>) lixplain tiw rule ofllosh function in cryptography. <iive any two I lash function,*.

OH

VIII a) Describe in detail, message autlienticalion with digital signatures.

Ii) lixplain how do wc achicve message integrity whit hash cotin.

IX a) Wluil docs Network Security mean?

Ii) Explain the general 'peels of key management and key dniribution.

OR

X n) Discuss in detail key Agreement protocols.

b) What ore tlte ways to employ Network Security?







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Cochin University of Science and Techology (CUST) 2005-7th Sem B.Tech Information Technology ,, IT 705 (C) Cryptography And Data Security (99 to 01 Ad) - Question Paper