You are on page 1of 2
or No of Pages : 2 Course Code: 081060 Roll No; (To be filled in by the candidate) PSG COLLEGE OF TECHNOLOGY, COIMBATORE - 641 004 SEMESTER EXAMINATIONS, ARRIL / MAY = 2012 BE - ELECTRONICS AND COMMUNICATION ENGINEERING — Semester: 7 081.060 NETWORK SECURITY Time : 3 Hours Maximum Marks: 100 INSTRUCTION: Group I and Group IT questions should be answered in the Main Answer Book Answet any FEVE questions in Group IL. Answer ALL questions in Group Land Group | Group III - Multiple Choice questions - (which will be given to the candidates half an hour before the scheduled clase of the exainination) should be answered only ii the space provided in the Main Answer Book, FePe GROUP I Marks: 10x3=30 1. Distinguish between passive and active security attacks Define the three security goals. Decrypt the following message which was encrypted using vernam cipher “UQXTQUYFR", [use one -time pad Key as NCBTZQARX] Compare cryptography with steganography List the significance of one wey function and Euler'stotient function State ‘the Fermat's and Euler's theorems used in public —key cryptography What are the basic requirements of hash functions? ep Mention the signing and verifying functions of Digital signature standards What is the difference between a virus and a worm? How do they reproduce? 10, What are the specification elements of MIME in Email security? pexnaas GROUPIL Marks: 5x 12 = 60 11, What are the security challenges in networks? Discuss in detail security breaches and vulnerability? What could be done te enhance security? 12, Discuss differant algorithm modes 10 enerypt one byte of data and a block of data at a time. 13. a) Perform encryption and decryption using the ASA algorithm tor p = 7; q = 11, e=i7andM=8. ® b) Discuss about Diffie-Heliman key exchange algorithm with suitable examples. (6) 14. a) Explain how the key management addressing the problem of public key distribution. 6 b) Explain the logic and compression funation of RIPEMD-160 algorithm. (6) 15. a) With neat sketch explain the design objectives and algorithm of HMAC, (6) b) Explain main features of SHA and mention its application and compare it with MDS. (6) 16, Explain about the IP security Architecture with the following terms (i) IP security decuments,(il) IP security service s,(iv) Security Asseciations(v) Transport and tunnel modes. /END/ FDIRL. Page No: | or No of Pages : 2 Course Code: 081060 Roll No} Write the Aiphabet of your choice answer for each question in the space provided in the Main Answer Book Ny mh ly) Vy vip vi) vill) bg) x) (Do nat attach this question paper along with theiMain Answer Book) ‘APRIL / MAY - 2012 08L060 NETWORK SECURITY GROUP II Marks: 10x 1 =10 The principle of ensures that only the sender and the intended recipients have acoass to the contents of a message ‘A) confidentiality -B) authentication —_—) Integrity D) access control The attack is related to availability A} interception B) fabrication C) modification D) interruption Caesar cipher is an example of A). Transposition Cipher B) Substitution Cipher C) substitution as well as transposition Cipher D) Transform Ciph In AES algorithm 16—byte key is expanded into A) 200 bytes B) 78 bytes ©) 176bytes =D) 184 bytes The main advantage of ECC is__ when compared to RSA A) Bigger key size B) smallerkey size G) more no of keys D) less no of keys The RSAisa__ key cryptographic algorithm A) asymmetsic B) symmetric ) synchronous —D) Asynchronous The strongestmessage digest algorithm is considered as A) SHAT B) SHA-128 ©) SHA256 D) SHA-512 RIPEMD-160 use.a_____ scheme for intorprating a message as a sequence of 32- bit words. A) little -endian B)bigendian C) single-endian —_D) multiple-endian _ _defines a format for text messages that are sent using Electronic mail A) RFC 228 B) RFC 282 c) RFC 822 D) RFC 288 Firewall is a specialized form ot a _ A) bridge B) router ©) disk D) printer Page No: 2

You might also like