Thursday, March 10, 2016

IT2352 CRYPTOGRAPHY AND NETWORK SECURITY April May 2015

Anna University Questions - IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY, April may 2015, Computer Science and Engineering, Seventh Semester, Regulation 2008/2010



Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2015
Subject Code
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46
Subject Name
Cryptography and Network Security
Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008/2010

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Seventh Semester
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Information Technology)
(Regulations 2008/2010)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 3.
3. Differentiate between stream ciphers and block ciphers.
4. State few applications of RC4 algorithm.
5. What is primitive root?
6. What is digital signature?
7. When are the certificates revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantage of intrusion detection system over firewall?

Part-B (5* 16 = 80 Marks)

11. (a) Explain the substitution encryption techniques in detail. (16)
Or
(b) State and derive
(i) Fermat’s theorem. (8)
(ii) Euler’s theorem. (8)

12. (a) Explain Data Encryption Standard (DES) in detail. (16)
Or
(b) Explain the RSA algorithm in detail. For the given values, trace the sequence of calculations in RSA. p=7, q=13, e=5, and m=10. (16)

13. (a) Explain ElGamal public key cryptosystems with an example. (16)
Or
(b) Explain secure hash in detail. (16)

14. (a) Explain Kerberos Version 4 in detail. (16)
Or
(b) Explain Secure Socket Layer (SSL) in detail. (16)

15. (a) Write brief notes on the following;
(i) Classification of viruses. (8)
(ii) Worm Counter measures. (8)
Or
(b) Explain the characteristics and types of firewalls. (16)

************************












No comments:

Post a Comment

Featured Content

Multiple choice questions in Natural Language Processing Home

MCQ in Natural Language Processing, Quiz questions with answers in NLP, Top interview questions in NLP with answers Multiple Choice Que...

All time most popular contents

data recovery