How To Exam?

a knowledge trading engine...


SKR Engineering College 2007 B.E Computer Science IT1352- CRYPTOGRAPHY AND NETWORK SECURITY - Question Paper

Wednesday, 06 February 2013 04:30Web

SKR Engineering College
Department Of Computer Science & Engineering
Model ques. Paper
IT1352- CRYPTOGRAPHY AND NETWORK SECURITY


PART-A 2*10=20

1. What is cryptography?
2. Give any 4 names of substitution techniques
3. What are the services described by x.800?
4. What is the purpose of Diffie-Hellman algorithm?
5. Define man in the middle attack
6. List design objectives for HMAC
7. What is MAC?
8. What are the requirements for digital signature?
9. Give the Kerberos simple dialogue
10. What is firewall?



PART-B 5*16=80

11 a(i) Briefly discuss about OSI security architecture (8)
(ii) discuss briefly about data encryption standard (8)

(OR)

b(i) discuss briefly about block cipher principles and modes of operation (12)
(ii) discuss about traffic confidentiality (4)

12 a(i) discuss briefly about Diffie-Hellman key exchange (16)

(OR)

b(i) discuss briefly about public key cryptography (8)
(ii) What is the use of RSA algorithm? (8)

13 a(i) Expalin briefly about MD5 message digest algorithm (12)
(ii) What is the use of authentication protocols? (4)

(OR)

b(i) discuss briefly about RIPEMD (16)





14 a(i) discuss about Kerberos (16)

(OR)
b(i) discuss briefly about web security (16)

15 a(i) explain the design principles of firewall (8)
(ii) What is meant by password management? (8)

(OR)

b(i) What is meant by virus and discuss briefly about threats? (16)

































SKR Engineering College
Department Of Computer Science & Engineering
Model ques. Paper
IT1352- CRYPTOGRAPHY AND NETWORK SECURITY


PART-A 2*10=20

1. What is encryption?
2. What is product cipher?
3. Difference ranging from conventional encryption and public key encryption
4. What is trap door?
5. Define Hash function
6. Define PEM
7. What is MIME?
8. What is Bastion host?
9. What are the kinds of firewall?
10. What is honeypot?


PART-B 5*16=80

11 a(i) discuss briefly about classical encryption techniques (16)

(OR)

b(i) What is the valuation criteria for AES? (16)

12 a(i) Briefly discuss about elliptic curve architecture and cryptography (16)

(OR)

b(i) discuss briefly about RSA algorithm (8)
(ii) discuss briefly about key management (8)

13 a(i) What is the need of secure hash algorithm (10)
(ii) What is digital signature standard? (6)

(OR)

b(i) discuss briefly about HMAC digital signature (16)

14 a(i) What is PGP and discuss briefly about its working principles (16)

(OR)

b(i) discuss In detail IP security (16)

15 a(i) What is the need of virus counter measures? (8)
(ii) elaborate the kinds of firewall? (8)

(OR)

b(i) discuss in detail Intrusion detection (8)
(ii) discuss in detail trusted systems (8)















( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER SKR Engineering College 2007 B.E Computer Science IT1352- CRYPTOGRAPHY AND NETWORK SECURITY - Question Paper