Exam Details
Subject | cryptography and network security | |
Paper | ||
Exam / Course | m.sc. computers | |
Department | ||
Organization | acharya nagarjuna university-distance education | |
Position | ||
Exam Date | May, 2017 | |
City, State | new delhi, new delhi |
Question Paper
Total No. of Questions 18] [Total No. of Pages 2
M.Sc. DEGREE EXAMINATION, MAY 2017
Second Year
Computer Science
CRYPTOGRAPHY AND NETWORK SECURITY
Time 3 Hours Maximum Marks 70
SECTION A × 15 45)
Answer three questions from the following
Q1) State and describe classical encryption techniques.
Q2) Describe Encryption and decryption functions of Triple DES. Compare its strength
with DES.
Q3) Describe the steps in message digest generation in Secure Hash Algorithm in detail.
Q4) With a neat sketch explain the IPSec scenario and IPSec Services.
Q5) State and explain about firewall design principles.
SECTION B × 4 20)
Answer any Five questions
Q6) State the model for Network security.
Q7) Differentiate the cipher properties of confusion and diffusion.
Q8) Describe primitive operations of CAST 128 Encryption.
Q9) Write short notes on key distribution scenario.
Q10) State describe Euclid's algorithm.
Q11) Describe the various modes of arbitrated digital signatures.
Q12) What are the similarities and differences between MIME and PGP?
Q13) Write about trusted systems.
SECTION C × 1
Answer all questions
Q14) Define passive attack.
Q15) What is the difference between mono alphabetic cipher and poly alphabetic cipher?
Q16) What is SSL?
Q17) Define worm.
Q18) Define symmetric key.
M.Sc. DEGREE EXAMINATION, MAY 2017
Second Year
Computer Science
CRYPTOGRAPHY AND NETWORK SECURITY
Time 3 Hours Maximum Marks 70
SECTION A × 15 45)
Answer three questions from the following
Q1) State and describe classical encryption techniques.
Q2) Describe Encryption and decryption functions of Triple DES. Compare its strength
with DES.
Q3) Describe the steps in message digest generation in Secure Hash Algorithm in detail.
Q4) With a neat sketch explain the IPSec scenario and IPSec Services.
Q5) State and explain about firewall design principles.
SECTION B × 4 20)
Answer any Five questions
Q6) State the model for Network security.
Q7) Differentiate the cipher properties of confusion and diffusion.
Q8) Describe primitive operations of CAST 128 Encryption.
Q9) Write short notes on key distribution scenario.
Q10) State describe Euclid's algorithm.
Q11) Describe the various modes of arbitrated digital signatures.
Q12) What are the similarities and differences between MIME and PGP?
Q13) Write about trusted systems.
SECTION C × 1
Answer all questions
Q14) Define passive attack.
Q15) What is the difference between mono alphabetic cipher and poly alphabetic cipher?
Q16) What is SSL?
Q17) Define worm.
Q18) Define symmetric key.
Subjects
- advanced computer architecture
- artifical intelligence
- compiler design
- computer graphics
- computer networks
- computer organization
- cryptography and network security
- data structures
- data ware housing & data mining
- database management systems
- design and analysis of algorithms
- discrete mathematical structures
- embedded systems
- image processing
- microprocessor & applications
- object oriented analysis and design
- object oriented programming
- software engineering
- tcp / ip
- theory of automata and formal languages
- user interface design