2016.pdf - Code No: RT41051 R13 Set No. 1 IV B.Tech I...

This preview shows page 1 - 2 out of 4 pages.

The preview shows page 1 - 2 out of 4 pages.
|''|'''||''||'''||||IV B.Tech I Semester Regular/Supplementary Examinations, Oct/Nov - 2018CRYPTOGRAPHY AND NETWORK SECURITY(Common to Computer Science and Engineering and Information Technology)Time: 3 hoursMax. Marks: 70Question paper consists of Part-A and Part-BAnswer ALL sub questions from Part-AAnswer any THREE questions from Part-B*****PARTA(22 Marks)1a)Differentiate between Active attacks and Passive Attacks.[4]b)Compare stream cipher with block cipher with an example.[4]c)Define Euler’s theorem andlist out its applications.[4]d)What are the requirements of the cryptographic hash functions?[3]e)What are the services provided by PGP services?[4]f)Illustrate the services provided by IPSec.[3]PARTB(3x16 = 48 Marks)2a)Discuss the various principles involved in private and public keycryptography.[8]b)Discuss any four Substitution Technique and list their merits and demerits.[8]3a)Explain in detail Feistel Block Cipher structure with neat sketch.b)Write a note on Block Cipher Design Principles.[8]4a)State andDescribe Fermat’s theorem[8].[8]b)Perform decryption and encryption using RSA algorithm with p=3, q=11, e=7and N=5.[8]5a)Write and explain the digital signature algorithm.[8]b)Illustrate in detail about the message authentication code and itsrequirements.[8]6How does PGP provide confidentiality and authentication service for e-mailand file storage applications? Draw the block diagram and explain itscomponents.[16]7a)Explain in detail the operation of Internet Key Exchange with an example.[8]b)Explain in detail about Host-Based Intrusion Detection Systems[8]Code No:RT41051Set No. 1R131 of 1

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Cryptography, Cryptographic hash function, Computer Science and Engineering and Information Technology

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture