Exam Details
Subject | cryptography & network security | |
Paper | ||
Exam / Course | m.sc. information technology | |
Department | ||
Organization | acharya nagarjuna university-distance education | |
Position | ||
Exam Date | May, 2018 | |
City, State | new delhi, new delhi |
Question Paper
Total No. of Questions 18] [Total No. of Pages 2
M.Sc. DEGREE EXAMINATION, MAY 2018
Second Year
INFORMATION TECHNOLOGY
Cryptography Network Security
Time 3 Hours Maximum Marks 70
SECTION A × 15 45)
Answer any THREE questions
Q1) Explain about DES in detail.
Q2) Explain about the different classes of polynomial Arithmetic.
Q3) Explain about different types of key distribution techniques.
Q4) Explain about RSA algorithm.
Q5) Explain about the Authentication using symmetric key and Public key approaches.
SECTION B × 4 20)
Answer any five questions
Q6) Explain about Steganography.
Q7) What is the difference between differential and linear cryptanalysis?
Q8) Explain about the difference between modular arithmetic and ordinary arithmetic with
example.
Q9) What is the difference between the AES decryption algorithm and the equivalent
inverse cipher?
Q10) List important design considerations for a stream cipher.
Q11) What is the difference between a session key and a master key?
Q12) What are three broad categories of applications of public key cryptosystems?
Q13) What requirements should a digital signature scheme satisfy?
SECTION C × 1
Answer all questions
Q14) What are the essential ingredients of a symmetric cipher?
Q15) What does it mean to say that b is a divisor of
Q16) What is a key distribution center?
Q17) What is a primitive root of a number?
Q18) What is a honeypot?
M.Sc. DEGREE EXAMINATION, MAY 2018
Second Year
INFORMATION TECHNOLOGY
Cryptography Network Security
Time 3 Hours Maximum Marks 70
SECTION A × 15 45)
Answer any THREE questions
Q1) Explain about DES in detail.
Q2) Explain about the different classes of polynomial Arithmetic.
Q3) Explain about different types of key distribution techniques.
Q4) Explain about RSA algorithm.
Q5) Explain about the Authentication using symmetric key and Public key approaches.
SECTION B × 4 20)
Answer any five questions
Q6) Explain about Steganography.
Q7) What is the difference between differential and linear cryptanalysis?
Q8) Explain about the difference between modular arithmetic and ordinary arithmetic with
example.
Q9) What is the difference between the AES decryption algorithm and the equivalent
inverse cipher?
Q10) List important design considerations for a stream cipher.
Q11) What is the difference between a session key and a master key?
Q12) What are three broad categories of applications of public key cryptosystems?
Q13) What requirements should a digital signature scheme satisfy?
SECTION C × 1
Answer all questions
Q14) What are the essential ingredients of a symmetric cipher?
Q15) What does it mean to say that b is a divisor of
Q16) What is a key distribution center?
Q17) What is a primitive root of a number?
Q18) What is a honeypot?
Subjects
- artificial intelligence
- basics of information technology
- computer networks
- computer organisation
- cryptography & network security
- data mining and techniques
- data structures with c
- database management systems
- operating systems
- programming with c++
- software engineering
- tcp / ip