How To Exam?

a knowledge trading engine...


Jawaharlal Nehru Technological University Kakinada 2010-2nd Sem M.Tech Computer Science & Engineering Supplementary s Network Security and Cryptography (Common to CSE-CS Engg &ECE-VLSI S

Sunday, 11 August 2013 03:35Web

Subject Code: B5707
M.Tech II Semester Supplementary exams June 2010
Network Security and Cryptography
(Common to CSE-CS Engg &ECE-VLSI System Design)
Time: three Hours Max Marks: 60
ans any 5 ques. All ques. carry EQUAL marks

1. a) elaborate the 2 approaches to attacking a cipher?
b) discuss any 2 Classical Encryption Techniques briefly.
2. a) How are sub keys generated in Blowfish?
b) provide the encryption function of Blowfish? Why is Brute force attack not possible on
Blowfish? What is the reason?
3. a) what is the difference ranging from link and end-to-end encryption?
b) discuss RSA algorithm. If n = 22, and e = five obtain 'd' .
4. a) Determine the gcd(24140,16762) using Euclid's algorithm.
b) discuss Chinese Remainder Theorem with example.
5. a) What requirements should a digital signature scheme satisfy?
b) discuss how a signature is signed and verified in Digital Signature Algorithm(DSA)?
6. provide the overview of Kerberos. Illustrate with an example.
7. a) discuss Transport and Tunnel mode AH on IPV4 protocol.
b) elaborate the features of SET? Show diagrammatically how the merchant verifies
customer purchase request?
8. discuss briefly
a) IP spoofing
b) Circuit level gateway
c) Statical Anamoly based Intrusion Detection


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Jawaharlal Nehru Technological University Kakinada 2010-2nd Sem M.Tech Computer Science & Engineering Supplementary s Network Security and Cryptography (Common to CSE-CS Engg &ECE-VLSI S