Exam Details
Subject | cryptography and network security | |
Paper | ||
Exam / Course | b.tech. - information technology | |
Department | ||
Organization | SETHU INSTITUTE OF TECHNOLOGY | |
Position | ||
Exam Date | May, 2017 | |
City, State | tamil nadu, pulloor |
Question Paper
Reg. No.
B.E. B.Tech. DEGREE EXAMINATION, MAY 2017
Sixth Semester
Information Technology
01UIT604 CRYPTOGRAPHY AND NETWORK SECURITY
(Regulation 2013)
Duration: Three hours Maximum: 100 Marks
Answer ALL Questions
PART A (10 x 2 20 Marks)
1. What is the difference between passive and active attacks.?
2. State Fermat's theorem.
3. Describe Chinese remainder theorem.
4. What is an avalanche effect?
5. List the characteristics of hash functions.
6. State the one-way property.
7. What are the technical shortcomings of Kerberos version
8. What is dual signature and write its purpose?
9. Can routers and bridges be used as firewalls? How?
10. List the types of viruses.
Question Paper Code: 31864
2
31864
PART B x 16 80 Marks)
11. Explain the various classical encryption techniques.
Or
Explain in detail about Fermat and Euler's theorem.
12. Describe chinese reminder theorem with an example.
Or
Describe the AES algorithm in detail.
13. How do you use digital signatures to authenticate users? Explain.
Or
Explain about the Diffie-Hellman key exchange algorithm with its advantages and disadvantages in detail.
14. Explain about IP security architecture in detail.
Or
Explain in detail about the SSL protocol in securing the data at the transport layer.
15. State the need for firewalls and write about types of firewalls in detail.
Or
Explain the Denial of service attacks. What kinds of damages are caused by viruses and worms?
B.E. B.Tech. DEGREE EXAMINATION, MAY 2017
Sixth Semester
Information Technology
01UIT604 CRYPTOGRAPHY AND NETWORK SECURITY
(Regulation 2013)
Duration: Three hours Maximum: 100 Marks
Answer ALL Questions
PART A (10 x 2 20 Marks)
1. What is the difference between passive and active attacks.?
2. State Fermat's theorem.
3. Describe Chinese remainder theorem.
4. What is an avalanche effect?
5. List the characteristics of hash functions.
6. State the one-way property.
7. What are the technical shortcomings of Kerberos version
8. What is dual signature and write its purpose?
9. Can routers and bridges be used as firewalls? How?
10. List the types of viruses.
Question Paper Code: 31864
2
31864
PART B x 16 80 Marks)
11. Explain the various classical encryption techniques.
Or
Explain in detail about Fermat and Euler's theorem.
12. Describe chinese reminder theorem with an example.
Or
Describe the AES algorithm in detail.
13. How do you use digital signatures to authenticate users? Explain.
Or
Explain about the Diffie-Hellman key exchange algorithm with its advantages and disadvantages in detail.
14. Explain about IP security architecture in detail.
Or
Explain in detail about the SSL protocol in securing the data at the transport layer.
15. State the need for firewalls and write about types of firewalls in detail.
Or
Explain the Denial of service attacks. What kinds of damages are caused by viruses and worms?
Other Question Papers
Subjects
- advanced database systems
- agile software development
- analog and digital communication
- analysis and design of algorithms
- applied statistics and queuing networks
- building enterprise application
- coding and information theory
- compiler design
- computer networks
- computer organization
- cryptography and network security
- data analytics
- data mining concepts and techniques
- database systems
- discrete mathematics
- embedded computing systems
- environmental science and engineering
- graphics with opengl
- high performance networks
- information storage management
- java programming
- management information systems
- microprocessors and microcontrollers
- mobile communication systems
- object oriented analysis and design
- object oriented programming
- object oriented software engineering methodologies
- principles of operating systems
- principles of software testing
- programming with data structures
- project management and finance
- qualitative and quantitative aptitude
- service oriented architecture
- software architecture
- transforms and partial differential equations
- user interface framework development
- web technology
- wireless communication