How To Exam?

a knowledge trading engine...


M.Tech-M.Tech Computer Science 4th Sem NETWORK SECURITY(Acharya Nagarjuna University (ANU), Guntur, Andhra Pradesh-2012)

Sunday, 25 August 2013 10:07anudouglas
M.Tech. DEGREE EXAMINATION, MAY 2012.
(Examination at the end of Final Year)
Computer Science
Elective II — Paper IX — NETWORK SECURITY
Time : Three hours Maximum : 75 marks
Answer Question No. 1 compulsorily.
Answer ONE question from each Unit.
1. (a) What is substitution cipher?
(b) What is the purpose of S-boxes in DES?
(c) What is meant by asymmetric key cryptography?
(d) What is electronic money?
(e) What is digital envelope?
(f) How is a digital signature generated?
(g) What is MIME?
UNIT I
2. (a) List and briefly define categories of security mechanisms.
(b) Write about the operation of DES with neat diagrams.
Or
3. (a) Write about linear and differential cryptoanalysis methods.
(b) Briefly discuss about AES.
UNIT II

4. (a) Discuss about the Miller-Rabin algorithm.
(b) Briefly write about the security of RSA.
Or
5. (a) Explain Diffie-Hellman algorithm.
(b) What are the requirements for the use of a public-key certificate scheme?
UNIT III
6. (a) What is an elliptic curve? On the elliptic curve over the real numbers
y x 36x
2 3
= − , let p = (− 5.9,5.3 ) and q = (− 5.8,5.2 ). Find p + q and 2p .
(b) What types of attacks are addressed by message authentication?
Or
7. (a) Discuss about CMAC.
(b) Explain the digital signature algorithm.
UNIT IV
8. (a) Write about the principal differences between version 4 and version 5 of kerberos.
(b) Briefly explain about pretty good privacy.
Or
9. (a) Discuss about Oakley key determination protocol.
(b) Discuss about antivirus approaches.
( 0 Votes )

Add comment


Security code
Refresh

Earning:  ₹ 5.50/-
You are here: PAPER M.Tech-M.Tech Computer Science 4th Sem NETWORK SECURITY(Acharya Nagarjuna University (ANU), Guntur, Andhra Pradesh-2012)