Exam Details
Subject | cryptography and computer security | |
Paper | ||
Exam / Course | computer science and engineering | |
Department | ||
Organization | Vardhaman College Of Engineering | |
Position | ||
Exam Date | June, 2017 | |
City, State | telangana, hyderabad |
Question Paper
Hall Ticket No: Question Paper Code B3677
(AUTONOMOUS) M. Tech I Semester Supplementary Examinations, June 2017
(Regulations: VCE-R15) CRYPTOGRAPHY AND COMPUTER SECURITY
(Computer Science and Engineering) Date: 12 June, 2017 AN Time: 3 hours Max Marks: 70
Answer any FIVE Questions
Each Question carries equal marks
1. Illustrate the security mechanisms in detail. 6M
Evaluate the cipher text applying a 2*2 hill cipher, given plain text is
"FRIDAY"
8M
2. Explain briefly the Feistal structure with a neat diagram. 8M
Enumerate different steps of SHA to generate the message digest.
6M
3. Discuss the possible attacks on a RSA algorithm. 7M
Give the details of security in Hash functions and MAC's.
7M
4. How does PGP provide public key management? 7M
Give the general format of PGP message and explain it.
7M
5. Describe the services provided by IPSec. 7M
Explain in brief ISAKMP.
7M
6. Examine how SSL provides confidentiality using symmetric encryption and message
integrity using MAC?
8M
Discuss how SET is designed to protect the credit card transactions on the internet?
6M
7. Compare and contrast SNMPV1 and SNMPV2 protocol data unit. 7M
Justify intrusion into a computer system or network is one of the most serious threats
to security.
7M
8. Summarize the characteristics and counter measures of DDOS (Distributed Denial of
Service attacks).
8M
Enumerate the counter measures of Viruses and Worms. 6M
(AUTONOMOUS) M. Tech I Semester Supplementary Examinations, June 2017
(Regulations: VCE-R15) CRYPTOGRAPHY AND COMPUTER SECURITY
(Computer Science and Engineering) Date: 12 June, 2017 AN Time: 3 hours Max Marks: 70
Answer any FIVE Questions
Each Question carries equal marks
1. Illustrate the security mechanisms in detail. 6M
Evaluate the cipher text applying a 2*2 hill cipher, given plain text is
"FRIDAY"
8M
2. Explain briefly the Feistal structure with a neat diagram. 8M
Enumerate different steps of SHA to generate the message digest.
6M
3. Discuss the possible attacks on a RSA algorithm. 7M
Give the details of security in Hash functions and MAC's.
7M
4. How does PGP provide public key management? 7M
Give the general format of PGP message and explain it.
7M
5. Describe the services provided by IPSec. 7M
Explain in brief ISAKMP.
7M
6. Examine how SSL provides confidentiality using symmetric encryption and message
integrity using MAC?
8M
Discuss how SET is designed to protect the credit card transactions on the internet?
6M
7. Compare and contrast SNMPV1 and SNMPV2 protocol data unit. 7M
Justify intrusion into a computer system or network is one of the most serious threats
to security.
7M
8. Summarize the characteristics and counter measures of DDOS (Distributed Denial of
Service attacks).
8M
Enumerate the counter measures of Viruses and Worms. 6M
Other Question Papers
Subjects
- advanced algorithms
- advanced algorithms laboratory
- advanced data communications
- advanced data structures
- advanced data structures laboratory audit course – i
- advanced mechanics of solids
- advanced mechanisms
- advanced operating systems
- advanced operating systems laboratory
- artificial intelligence and neural networks
- business analytics
- cloud computing
- cloud computing laboratory
- cmos vlsi design
- computer graphics
- computer organization and architecture
- computer vision and pattern recognition
- constitution of india
- cpld and fpga architectures and applications
- cryptography and computer security
- data warehousing and data mining
- datawarehousing and data mining
- design patterns
- digital image processing
- digital systems design
- disaster management
- distributed computing
- distributed databases
- distributed operating systems
- dsp processors and architectures
- embedded linux
- embedded real time operating systems
- embedded systems
- energy conversion systems
- english for research papers writing
- entrepreneurship development
- finite element methods
- fracture, fatigue and creep deformation
- human computer interaction
- image processing
- industrial safety
- information retrieval systems
- information security
- machine learning
- major project phase-i
- major project phase-ii
- microcontrollers for embedded system design
- mini project with seminar audit course – ii
- mobile computing
- mobile satellite communications
- national service scheme
- number theory and cryptography
- object oriented analysis and design
- operations research
- pedagogy studies
- personality development through life enlightenment skills
- power electronic control of dc drives
- power electronic converters-i
- power semi conductor devices
- principles of machine modeling analysis
- research methodology and intellectual property rights
- sanskrit for technical knowledge
- semantic web and social networks
- software engineering principles
- solar, energy and applications
- stress management by yoga
- system modeling and simulation
- value education
- waste to energy
- web security
- wireless and mobile computing