Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
06rr410504 Network Security and Cryptography

06rr410504 Network Security and Cryptography

Ratings: (0)|Views: 44|Likes:
Published by andhracolleges

More info:

Published by: andhracolleges on May 01, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/24/2012

pdf

text

original

 
Seminar Topics - Scholarships - Admission/Entrance Exam NotificationsUSA-UK-Australia-Germany-France-NewZealand Universities ListEngineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information
www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh
www.andhracolleges.com
Code No: RR410504
Set No. 1
IV B.Tech I Semester Regular Examinations, November 2006NETWORK SECURITY AND CRYPTOGRAPHY(Computer Science & Engineering)Time: 3 hours Max Marks: 80Answer any FIVE QuestionsAll Questions carry equal marks
⋆ ⋆ ⋆ ⋆ ⋆
1. Discuss in detail Simple-DES. [16M]2. Explain the process of encryption and decryption in IDEA algorithm. [16M]3. (a) Explain public key Crypto Systems. [6M](b) Explain in detail about Euclids Algorithm. [5M](c) Give a brief account on Random number Generation. [5M]4. (a) Explain Chinese Remainder Theorem.(b) Find all primitive roots of 7. [8+8]5. (a) In what order should the signature function and the confidentiality functionbe applied to message, and why?(b) What are some threats associated with a direct digital signature scheme? [8+8]6. (a) List limitations of SMTP/822 scheme?(b) What are the MIME specications? [8+8]7. (a) What are the basic approaches to building SAs?(b) What are the roles of the Oakley key determination protocol and ISAKMP inIPSec? [6+10]8. (a) what information used by a typical packet-filtering router?(b) What are some weaknesses of a packet-filtering router?(c) What is the difference between a packet-filtering router and a stateful inspec-tion rewall? [8+4+4]
⋆ ⋆ ⋆ ⋆ ⋆
1 of 1
 
Seminar Topics - Scholarships - Admission/Entrance Exam NotificationsUSA-UK-Australia-Germany-France-NewZealand Universities ListEngineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information
www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh
www.andhracolleges.com
Code No: RR410504
Set No. 2
IV B.Tech I Semester Regular Examinations, November 2006NETWORK SECURITY AND CRYPTOGRAPHY(Computer Science & Engineering)Time: 3 hours Max Marks: 80Answer any FIVE QuestionsAll Questions carry equal marks
⋆ ⋆ ⋆ ⋆ ⋆
1. (a) What is dierence between diusion and confusion? [6M](b) What is it importance to study the Feistel cipher? [10M]2. Explain the process of encryption and decryption in RC5 algorithm. [16M]3. Consider the following scheme(a) Pick an odd number E(b) Pick two prime numbers, P and Q, where (P-1)(Q-1)-1 is evenly distributedby E(c) Multiply P and Q to get N(d) Calculate
D
=
(
1)(
Q
1)(
1)+1
Is this scheme is equivalent to RSA ? Show why or why not [16M]4. (a) what is a primitive root of a number?(b) Find all primitive roots of 7.(c) Using Fermat’s theorem, find 3
201
mod 11. [6M+6M+4M]5. Define digital Signature. Explain its role in network security. [16M]6. (a) Discuss cryptographic algorithms used in S/MIME(b) List limitations of SMTP/822 scheme? [8+8]7. (a) What are the basic approaches to building SAs?(b) What are the roles of the Oakley key determination protocol and ISAKMP inIPSec? [6+10]8. Write notes on(a) Trapdoors(b) Logic bomb(c) Trojan horses [5+5+6]
⋆ ⋆ ⋆ ⋆ ⋆
1 of 1
 
Seminar Topics - Scholarships - Admission/Entrance Exam NotificationsUSA-UK-Australia-Germany-France-NewZealand Universities ListEngineering-MBA-MCA-Medical-Pharmacy-B.Ed-Law Colleges Information
www.andhracolleges.com The Complete Information About Colleges in Andhra Pradesh
www.andhracolleges.com
Code No: RR410504
Set No. 3
IV B.Tech I Semester Regular Examinations, November 2006NETWORK SECURITY AND CRYPTOGRAPHY(Computer Science & Engineering)Time: 3 hours Max Marks: 80Answer any FIVE QuestionsAll Questions carry equal marks
⋆⋆⋆⋆⋆
1. This problem provides a numerical example of encryption using a one-round versionof DES. We start with the same bit pattern for the key and plain text, namely,In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E FInbinary notation: 0000 0001 0010 0011 0100 0101 0110 01111000 1001 1010 1011 1100 1101 1110 1111(a) Derive
1
, the first - round subkey.(b) Derive
L
0
,R
0
(c) Expand R
0
to get
[
R
0
](d) Calculate A=
[
R
0
]
1
.(e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the correspondingS-box substitutions.(f) Cancatenate the results of (e) to get a 32-bit result,B.(g) Apply the permutation to get P(B).(h) Calculate R1=P(B)
L
0
(i) write down the cipher text. [16M]2. Demonstrate that Blow Fish decryption is inverse of Blowfish encryption. [16M]3. (a) Explain RSA Algorithm? [8M](b) In a RSA system, the public key of a given user is e=31,n=3599.What is theprivate key of this user? [8M]4. (a) Explain in detail about Extended Euclid’s Algorithm.(b) Determine Multiplicative inverse of 550 in GF(1759). [8+8]5. (a) what are digital signature standards?(b) Explain Digital signature algorithm. [8+8]6. (a) What problem was Kerberos designed to address?(b) What are three threats associated with user authentication over a network orInternet?(c) List three approaches to secure user authentication over a network or Internet?[4+4+8]1 of 2

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->