You are on page 1of 1

Code No: 54115/MT M.Tech.

I Semester Supplementary Examinations, September, 2008

NR

NETWORK SECURITY & CRYPTOGRAPHY (Common to Digital Systems & Computer Electronics/ Digital Electronics & Communication Systems/ Information Technology) Time: 3hours Answer any FIVE questions All questions carry equal marks --1.a) b) 2.a) b) c) 3.a) b) 4.a) b) 5.a) b) c) 6.a) b) c) 7.a) b) c) 8. Describe the security mechanism defined in X.800 What is transposition cipher? Explain the encryption process with an example. Describe S-DES encryption algorithm. Describe the avalanche effect in DES. What are the characteristics of advanced symmetric block ciphers? Describe key distribution technique. Describe Diffie-Hellman key exchange algorithm. Describe an attractive and popular algorithm to determine whether the given number is prime. Illustrate different ways in which a hash code can be used to provide message authentication. Describe the steps involved in secure hash algorithm (SHA-I) What is the difference between direct and arbitrated digital signature? What are the differences in crypto system and digital signature? What are the principal difference between versions 4 and versions 5 for kerberos? What are the technical deficiencies of kerberos version 4 protocol? Describe X.509 alternative authentication procedures. What are the issues in Web Security? Distinguish between transport mode and tunnel mode encryption in the IPSec ESP service. Explain the key management portion of IPSec. Write short notes on: a) Pretty Good Privacy b) Firewall design principles c) Message authentication. $$$ Max. Marks:60

You might also like